Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-9484

Опубликовано: 20 мая 2020
Источник: ubuntu
Приоритет: low
EPSS Критический
CVSS2: 4.4
CVSS3: 7

Описание

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

eoan

DNE

esm-apps/bionic

released

7.0.78-1ubuntu0.1~esm1
esm-apps/xenial

released

7.0.68-1ubuntu0.4+esm2
esm-infra-legacy/trusty

not-affected

7.0.52-1ubuntu0.16+esm1
esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

eoan

DNE

esm-apps/bionic

released

8.5.39-1ubuntu1~18.04.3+esm2
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

esm-infra/xenial

not-affected

8.0.32-1ubuntu1.13
focal

DNE

groovy

DNE

hirsute

DNE

Показывать по

РелизСтатусПримечание
bionic

released

9.0.16-3ubuntu0.18.04.2
devel

not-affected

9.0.35-1
eoan

ignored

end of life
esm-apps/bionic

released

9.0.16-3ubuntu0.18.04.2
esm-apps/focal

released

9.0.31-1ubuntu0.1
esm-apps/jammy

not-affected

9.0.35-1
esm-apps/noble

not-affected

9.0.35-1
esm-infra-legacy/trusty

DNE

focal

released

9.0.31-1ubuntu0.1
groovy

not-affected

9.0.35-1

Показывать по

EPSS

Процентиль: 100%
0.93261
Критический

4.4 Medium

CVSS2

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
redhat
около 5 лет назад

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.

CVSS3: 7
nvd
около 5 лет назад

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.

CVSS3: 7
debian
около 5 лет назад

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to ...

suse-cvrf
около 5 лет назад

Security update for tomcat

suse-cvrf
около 5 лет назад

Security update for tomcat

EPSS

Процентиль: 100%
0.93261
Критический

4.4 Medium

CVSS2

7 High

CVSS3

Уязвимость CVE-2020-9484