Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19465
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14933
https://exchange.xforce.ibmcloud.com/vulnerabilities/69472
http://www.securitytracker.com/id?1025993
http://www.securityfocus.com/bid/49353
http://www.securityfocus.com/archive/1/519466/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDVSA-2011:156
http://www.debian.org/security/2012/dsa-2401
http://securityreason.com/securityalert/8362
http://secunia.com/advisories/57126
http://secunia.com/advisories/49094
http://secunia.com/advisories/48308
http://secunia.com/advisories/45748
http://marc.info/?l=bugtraq&m=139344343412337&w=2
http://marc.info/?l=bugtraq&m=136485229118404&w=2