![]() ![]() CVE-2020-1745 is a vulnerability very similar to CVE-2020-1938 but occurs in Apache Undertow. CVE-2020-1938 is a file read/inclusion vulnerability in the AJP connector in Apache Tomcat. Due to the inclusion of Apache Tomcat in Red Hat products, multiple vulnerabilities have been announced in Red Hat products, the most severe of which could allow for reading of arbitrary files on the affected system.If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights. Depending on the privileges associated with the application, an attacker could install programs view, change, or delete data or create new accounts with full user rights. Successful exploitation of the vulnerability could allow an attacker to read arbitrary files on the affected server. If the server is running a web application that allows for file uploads, a remote file inclusion vulnerability that could allow for remote code execution becomes exploitable. The vulnerability can be exploited by an attacker who can communicate with the affected AJP protocol service. The vulnerability exists in the Apache JServ Protocol (AJP), which is by default exposed over TCP port 8009 and enabled. A vulnerability has been discovered in Apache Tomcat, which could allow for reading of arbitrary files on the affected system. ![]() If your Linux distribution or apps include Tomcat, watch for updates from your vendor and apply them.If the AJP service does not need to be publicly accessible, ensure that access is filtered.If the Apache JServ Protocol (AJP) service is not required, disable it on the host.The AJP connector is enabled by default on all Tomcat servers. Red Hat recommends disabling the Apache JServ Protocol (AJP) connector in Tomcat if not used, or binding it to localhost port, since most of AJP's use is in cluster environments, and the 8009 port should never be exposed on the internet without strict access-control lists.Apache Tomcat has released versions 9.0.31, 8.5.51, and 7.0.100 to fix this vulnerability. Update to the latest version of Apache Tomcat.This is particularly important for any systems that allow access from untrusted networks, such as those exposed to access from the internet. The need for immediate action requires an expedited timeframe that supersedes the remediation timeframes in Vulnerability Management (DS-21). Update as soon as possible after appropriate testing. ![]()
0 Comments
Leave a Reply. |