So, IF you can:Ģ) these files are saved inside the document root (eg. Just for clarify: CVE-2020-1938 is NOT a default Remote Code Execution vul. Henry Chen, a security researcher at Alibaba Cloud, published a tweet confirming that exploiting the vulnerability would allow someone to “read any webapps files or include a file to RCE.” Chen shared a GIF showing the successful exploitation of the vulnerability. ![]() Tomcat has fix this vulnerability ,UPDATE! /Jauc5zPF3a You can read any webapps files or include a file to RCE. This vulnerability was discovered by a security researcher of Chaitin Tech. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution (RCE).īecause AJP is enabled by default in the /conf/server.xml file in Apache Tomcat 6, 7, 8 and 9, all unpatched versions of Tomcat are vulnerable to Ghostcat.Īpache Tomcat AJP Vulnerability (CNVD-2020-10487/CVE-2020-1938 ). A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. This is enabled by default with a default configuration port of 8009. AnalysisĬVE-2020-1938 is a file read/inclusion vulnerability in the AJP connector in Apache Tomcat. The vulnerability, dubbed Ghostcat, was discovered by researchers at Chaitin Tech and reported to the Apache Software Foundation on January 3, 2020. ![]() ![]() AJP is a binary protocol designed to handle requests sent to a web server destined for an application server in order to improve performance. On February 20, China National Vulnerability Database (CNVD) published a security advisory for CNVD-2020-10487, a severe vulnerability in Apache Tomcat’s Apache JServ Protocol (or AJP). Several proof-of-concept exploit scripts for recently patched flaw in Apache Tomcat are now available.
0 Comments
Leave a Reply. |