gsd-2020-1745
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-1745", "description": "A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.", "id": "GSD-2020-1745", "references": [ "https://access.redhat.com/errata/RHSA-2020:3779", "https://access.redhat.com/errata/RHSA-2020:3192", "https://access.redhat.com/errata/RHSA-2020:2905", "https://access.redhat.com/errata/RHSA-2020:2515", "https://access.redhat.com/errata/RHSA-2020:2513", "https://access.redhat.com/errata/RHSA-2020:2512", "https://access.redhat.com/errata/RHSA-2020:2511", "https://access.redhat.com/errata/RHSA-2020:2367", "https://access.redhat.com/errata/RHSA-2020:2333", "https://access.redhat.com/errata/RHSA-2020:2061", "https://access.redhat.com/errata/RHSA-2020:2060", "https://access.redhat.com/errata/RHSA-2020:2059", "https://access.redhat.com/errata/RHSA-2020:2058", "https://access.redhat.com/errata/RHSA-2020:0962", "https://access.redhat.com/errata/RHSA-2020:0961", "https://access.redhat.com/errata/RHSA-2020:0952", "https://access.redhat.com/errata/RHSA-2020:0813", "https://access.redhat.com/errata/RHSA-2020:0812" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-1745" ], "details": "A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.", "id": "GSD-2020-1745", "modified": "2023-12-13T01:21:57.585942Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-1745", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "undertow", "version": { "version_data": [ { "version_value": "\u003c= 2.0.29.Final" } ] } } ] }, "vendor_name": "undertow-io" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution." } ] }, "impact": { "cvss": [ [ { "vectorString": "8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285" } ] } ] }, "references": { "reference_data": [ { "name": "https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/", "refsource": "MISC", "url": "https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/" }, { "name": "https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487", "refsource": "MISC", "url": "https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1745", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1745" }, { "name": "https://www.cnvd.org.cn/webinfo/show/5415", "refsource": "MISC", "url": "https://www.cnvd.org.cn/webinfo/show/5415" }, { "name": "https://security.netapp.com/advisory/ntap-20240216-0011/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20240216-0011/" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "(,2.0.29]", "affected_versions": "All versions up to 2.0.29", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-937" ], "date": "2021-09-14", "description": "A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of in Undertow. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.", "fixed_versions": [ "2.0.30.Final" ], "identifier": "CVE-2020-1745", "identifiers": [ "CVE-2020-1745" ], "not_impacted": "All versions after 2.0.29", "package_slug": "maven/io.undertow/undertow-core", "pubdate": "2020-04-28", "solution": "Upgrade to version 2.0.30.Final or above.", "title": "Information Exposure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1745", "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1745" ], "uuid": "83e7f0c2-78b5-4fd9-b825-9d7fc84fe9a9" }, { "affected_range": "[6.0.0,6.0.53],[7.0.0,7.0.100),[8.0.0,8.5.51),[9.0.0,9.0.31)", "affected_versions": "All versions starting from 6.0.0 up to 6.0.53, all versions starting from 7.0.0 before 7.0.100, all versions starting from 8.0.0 before 8.5.51, all versions starting from 9.0.0 before 9.0.31", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-937" ], "date": "2020-05-05", "description": "A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.", "fixed_versions": [ "7.0.100", "8.5.51", "9.0.31" ], "identifier": "CVE-2020-1745", "identifiers": [ "CVE-2020-1745" ], "not_impacted": "All versions before 6.0.0, all versions after 6.0.53 before 7.0.0, all versions starting from 7.0.100 before 8.0.0, all versions starting from 8.5.51 before 9.0.0, all versions starting from 9.0.31", "package_slug": "maven/org.apache.tomcat.embed/tomcat-embed-core", "pubdate": "2020-04-28", "solution": "Upgrade to versions 7.0.100, 8.5.51, 9.0.31 or above.", "title": "Information Exposure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1745", "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1745" ], "uuid": "48577359-7a53-4749-b9c5-edf597345ba0" }, { "affected_range": "[6.0.0,6.0.53],[7.0.0,7.0.100),[8.0.0,8.5.51),[9.0.0,9.0.31)", "affected_versions": "All versions starting from 6.0.0 up to 6.0.53, all versions starting from 7.0.0 before 7.0.100, all versions starting from 8.0.0 before 8.5.51, all versions starting from 9.0.0 before 9.0.31", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-937" ], "date": "2020-05-05", "description": "A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.", "fixed_versions": [ "7.0.100", "8.5.51", "9.0.31" ], "identifier": "CVE-2020-1745", "identifiers": [ "CVE-2020-1745" ], "not_impacted": "All versions before 6.0.0, all versions after 6.0.53 before 7.0.0, all versions starting from 7.0.100 before 8.0.0, all versions starting from 8.5.51 before 9.0.0, all versions starting from 9.0.31", "package_slug": "maven/org.apache.tomcat/tomcat", "pubdate": "2020-04-28", "solution": "Upgrade to versions 7.0.100, 8.5.51, 9.0.31 or above.", "title": "Information Exposure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1745", "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1745" ], "uuid": "05872521-af3e-4e24-9e6d-2c564b0b952b" } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C8F458A-06B7-474B-9C5C-756F893886D1", "versionEndIncluding": "2.0.29", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution." }, { "lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad de inclusi\u00f3n de archivo en el conector AJP habilitado con un puerto de configuraci\u00f3n AJP predeterminado de 8009 en Undertow versi\u00f3n 2.0.29.Final y anteriores y se corrigi\u00f3 en la versi\u00f3n 2.0.30.Final. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad para leer archivos de aplicaciones web desde un servidor vulnerable. En los casos en que el servidor vulnerable permite la carga de archivos, un atacante podr\u00eda cargar c\u00f3digo malicioso JavaServer Pages (JSP) dentro de una variedad de tipos de archivos y desencadenar esta vulnerabilidad para conseguir una ejecuci\u00f3n de c\u00f3digo remota." } ], "id": "CVE-2020-1745", "lastModified": "2024-02-16T13:15:09.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.7, "source": "secalert@redhat.com", "type": "Secondary" } ] }, "published": "2020-04-28T15:15:13.037", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1745" }, { "source": "secalert@redhat.com", "tags": [ "Not Applicable" ], "url": "https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/" }, { "source": "secalert@redhat.com", "url": "https://security.netapp.com/advisory/ntap-20240216-0011/" }, { "source": "secalert@redhat.com", "tags": [ "Not Applicable" ], "url": "https://www.cnvd.org.cn/webinfo/show/5415" }, { "source": "secalert@redhat.com", "tags": [ "Not Applicable" ], "url": "https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-285" } ], "source": "secalert@redhat.com", "type": "Secondary" } ] } } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.