Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-1745

Опубликовано: 28 апр. 2020
Источник: debian
EPSS Низкий

Описание

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
undertowfixed2.0.30-1package

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1807305

  • Variant of the Ghostcat Tomcat vulnerability, CVE-2020-1938.

  • According to https://lists.jboss.org/pipermail/undertow-dev/2020-March/002422.html

  • the fix is: https://github.com/undertow-io/undertow/pull/859

EPSS

Процентиль: 70%
0.00636
Низкий

Связанные уязвимости

CVSS3: 8.6
ubuntu
больше 5 лет назад

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

CVSS3: 7.6
redhat
больше 5 лет назад

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

CVSS3: 8.6
nvd
больше 5 лет назад

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

CVSS3: 8.6
github
больше 3 лет назад

Improper Authorization in Undertoe

CVSS3: 7.5
fstec
больше 5 лет назад

Уязвимость сервиса AJP Connector сервера приложений Apache Tomcat, позволяющая нарушителю получить несанкционированный доступ на чтения файлов веб-приложений

EPSS

Процентиль: 70%
0.00636
Низкий