Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-1745

Опубликовано: 26 фев. 2020
Источник: redhat
CVSS3: 7.6
EPSS Низкий

Описание

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

Отчет

Please refer to the Red Hat knowledgebase article: https://access.redhat.com/solutions/4851251 and CVE page https://access.redhat.com/security/cve/cve-2020-1938

Меры по смягчению последствий

Please refer to the Red Hat knowledgebase article: https://access.redhat.com/solutions/4851251

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Decision Manager 7undertowNot affected
Red Hat JBoss Fuse 6undertowOut of support scope
Red Hat OpenShift Application RuntimesundertowAffected
Red Hat OpenStack Platform 13 (Queens)opendaylightWill not fix
Red Hat Process Automation 7undertowNot affected
EAP-CD 19 Tech PreviewundertowFixedRHSA-2020:233328.05.2020
Red Hat Data Grid 7.3.7undertowFixedRHSA-2020:377917.09.2020
Red Hat Fuse 7.7.0undertowFixedRHSA-2020:319228.07.2020
Red Hat JBoss EAP 7undertow-coreFixedRHSA-2020:251510.06.2020
Red Hat JBoss EAP 7.2undertow-coreFixedRHSA-2020:081212.03.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-285
https://bugzilla.redhat.com/show_bug.cgi?id=1807305undertow: AJP File Read/Inclusion Vulnerability

EPSS

Процентиль: 70%
0.00636
Низкий

7.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
больше 5 лет назад

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

CVSS3: 8.6
nvd
больше 5 лет назад

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.

CVSS3: 8.6
debian
больше 5 лет назад

A file inclusion vulnerability was found in the AJP connector enabled ...

CVSS3: 8.6
github
больше 3 лет назад

Improper Authorization in Undertoe

CVSS3: 7.5
fstec
больше 5 лет назад

Уязвимость сервиса AJP Connector сервера приложений Apache Tomcat, позволяющая нарушителю получить несанкционированный доступ на чтения файлов веб-приложений

EPSS

Процентиль: 70%
0.00636
Низкий

7.6 High

CVSS3

Уязвимость CVE-2020-1745