目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2020-9484— Apache Tomcat 代码问题漏洞

EPSS 93.46% · P100
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2020-9484の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
N/A
ソース: NVD (National Vulnerability Database)
脆弱性説明
When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Apache Tomcat 代码问题漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat中存在代码问题漏洞。攻击者可通过控制服务器上文件的内容和名称等方法利用该漏洞执行代码。以下产品及版本受到影响:Apache Tomcat 10.0.0-M1版本至10.0.0-M4版本,9.0.0.0.M1版本至9.0.43之前版本,8.5.0版本至8.5.63之前版本,7.0.0版本至7.0.108之前版本。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

Shenlong 10 Questions — AI 深度分析

十问解析:根本原因、利用方式、修复建议、紧迫性。摘要免费,完整版需登录。

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
-Apache Tomcat Apache Tomcat 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54, 7.0.0 to 7.0.103 -

II. CVE-2020-9484の公開POC

#POC説明ソースリンクShenlongリンク
1tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!https://github.com/threedr3am/tomcat-cluster-session-sync-expPOC詳細
2Nonehttps://github.com/masahiro331/CVE-2020-9484POC詳細
3利用ceye批量检测CVE-2020-9484https://github.com/seanachao/CVE-2020-9484POC詳細
4用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞https://github.com/IdealDreamLast/CVE-2020-9484POC詳細
5for Ubuntu 18.04, improve functions.https://github.com/qerogram/CVE-2020-9484POC詳細
6CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE https://github.com/osamahamad/CVE-2020-9484-Mass-ScanPOC詳細
7Nonehttps://github.com/anjai94/CVE-2020-9484-exploitPOC詳細
8Nonehttps://github.com/PenTestical/CVE-2020-9484POC詳細
9A smol bash script I threw together pretty quickly to scan for vulnerable versions of the Apache Tomcat RCE. I'll give it some love when I have the time. https://github.com/DanQMoo/CVE-2020-9484-ScannerPOC詳細
10Nonehttps://github.com/AssassinUKG/CVE-2020-9484POC詳細
11POC for CVE-2020-9484https://github.com/VICXOR/CVE-2020-9484POC詳細
12Nonehttps://github.com/DXY0411/CVE-2020-9484POC詳細
13Apache Tomcat RCE (CVE-2020-9484)https://github.com/RepublicR0K/CVE-2020-9484POC詳細
14POC - Apache Tomcat Deserialization Vulnerability (CVE-2020-9484)https://github.com/ColdFusionX/CVE-2020-9484POC詳細
15Exploit for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCEhttps://github.com/d3fudd/CVE-2020-9484_ExploitPOC詳細
16small test to prevent sql injections attack. 🔒 CVE-2020-9484https://github.com/pxcs/webLogin-DEVPOC詳細
17Remake of CVE-2020-9484 by Pentesticalhttps://github.com/0dayCTF/CVE-2020-9484POC詳細
18Bash POC for CVE-2020-9484 that i used in tryhackme challengehttps://github.com/Disturbante/CVE-2020-9484POC詳細
19Remake of CVE-2020-9484 by Pentesticalhttps://github.com/deathquote/CVE-2020-9484POC詳細
20PoC exploit for CVE-2020-9484, and a vulnerable web application for its demonstrationhttps://github.com/savsch/PoC_CVE-2020-9484POC詳細
21When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-9484.yamlPOC詳細
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2020-9484のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-05-20 · 17 CVEs total

CVE-2020-13241Microweber 代码问题漏洞
CVE-2020-13249MariaDB Connector/C 安全漏洞
CVE-2020-13246Gitea 安全漏洞
CVE-2020-13239Dolibarr ERP/CRM DMS/ECM模块跨站脚本漏洞
CVE-2020-13240Dolibarr ERP/CRM DMS/ECM模块跨站脚本漏洞
CVE-2020-13231Cacti 跨站请求伪造漏洞
CVE-2020-1955Apache CouchDB 安全漏洞
CVE-2020-13230Cacti 安全漏洞
CVE-2020-5753Signal Private Messenger 信息泄露漏洞
CVE-2020-3956VMware Cloud Director 注入漏洞
CVE-2020-11716多款Panasonic产品安全漏洞
CVE-2020-12835SmartBear Software ReadyAPI 注入漏洞
CVE-2020-13152KDE Amarok 资源管理错误漏洞
CVE-2020-13226WSO2 API Manager 代码问题漏洞
CVE-2020-13225phpIPAM 跨站脚本漏洞
CVE-2020-12034Rockwell Automation EDS Subsystem SQL注入漏洞

IV. 関連脆弱性

V. CVE-2020-9484へのコメント

まだコメントはありません


コメントを残す