Description
The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.
Remediation
References
Related Vulnerabilities
MySQL CVE-2020-2779 Vulnerability (CVE-2020-2779)
MySQL CVE-2019-2688 Vulnerability (CVE-2019-2688)
WordPress Plugin Admin side data storage for Contact Form 7 Cross-Site Scripting (1.1.1)
Envoy Proxy CVE-2020-25018 Vulnerability (CVE-2020-25018)
WordPress Plugin WordPress for Google Maps-WP MAPS Cross-Site Request Forgery (4.2.3)