Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | Apache Tomcat | Apache Tomcat 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54, 7.0.0 to 7.0.103 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞! | https://github.com/threedr3am/tomcat-cluster-session-sync-exp | POC Details |
| 2 | None | https://github.com/masahiro331/CVE-2020-9484 | POC Details |
| 3 | 利用ceye批量检测CVE-2020-9484 | https://github.com/seanachao/CVE-2020-9484 | POC Details |
| 4 | 用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞 | https://github.com/IdealDreamLast/CVE-2020-9484 | POC Details |
| 5 | for Ubuntu 18.04, improve functions. | https://github.com/qerogram/CVE-2020-9484 | POC Details |
| 6 | CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE | https://github.com/osamahamad/CVE-2020-9484-Mass-Scan | POC Details |
| 7 | None | https://github.com/anjai94/CVE-2020-9484-exploit | POC Details |
| 8 | None | https://github.com/PenTestical/CVE-2020-9484 | POC Details |
| 9 | A smol bash script I threw together pretty quickly to scan for vulnerable versions of the Apache Tomcat RCE. I'll give it some love when I have the time. | https://github.com/DanQMoo/CVE-2020-9484-Scanner | POC Details |
| 10 | None | https://github.com/AssassinUKG/CVE-2020-9484 | POC Details |
| 11 | POC for CVE-2020-9484 | https://github.com/VICXOR/CVE-2020-9484 | POC Details |
| 12 | None | https://github.com/DXY0411/CVE-2020-9484 | POC Details |
| 13 | Apache Tomcat RCE (CVE-2020-9484) | https://github.com/RepublicR0K/CVE-2020-9484 | POC Details |
| 14 | POC - Apache Tomcat Deserialization Vulnerability (CVE-2020-9484) | https://github.com/ColdFusionX/CVE-2020-9484 | POC Details |
| 15 | Exploit for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE | https://github.com/d3fudd/CVE-2020-9484_Exploit | POC Details |
| 16 | small test to prevent sql injections attack. 🔒 CVE-2020-9484 | https://github.com/pxcs/webLogin-DEV | POC Details |
| 17 | Remake of CVE-2020-9484 by Pentestical | https://github.com/0dayCTF/CVE-2020-9484 | POC Details |
| 18 | Bash POC for CVE-2020-9484 that i used in tryhackme challenge | https://github.com/Disturbante/CVE-2020-9484 | POC Details |
| 19 | Remake of CVE-2020-9484 by Pentestical | https://github.com/deathquote/CVE-2020-9484 | POC Details |
| 20 | PoC exploit for CVE-2020-9484, and a vulnerable web application for its demonstration | https://github.com/savsch/PoC_CVE-2020-9484 | POC Details |
| 21 | When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-9484.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-13241 | Microweber 代码问题漏洞 | |
| CVE-2020-13249 | MariaDB Connector/C 安全漏洞 | |
| CVE-2020-13246 | Gitea 安全漏洞 | |
| CVE-2020-13239 | Dolibarr ERP/CRM DMS/ECM模块跨站脚本漏洞 | |
| CVE-2020-13240 | Dolibarr ERP/CRM DMS/ECM模块跨站脚本漏洞 | |
| CVE-2020-13231 | Cacti 跨站请求伪造漏洞 | |
| CVE-2020-1955 | Apache CouchDB 安全漏洞 | |
| CVE-2020-13230 | Cacti 安全漏洞 | |
| CVE-2020-5753 | Signal Private Messenger 信息泄露漏洞 | |
| CVE-2020-3956 | VMware Cloud Director 注入漏洞 | |
| CVE-2020-11716 | 多款Panasonic产品安全漏洞 | |
| CVE-2020-12835 | SmartBear Software ReadyAPI 注入漏洞 | |
| CVE-2020-13152 | KDE Amarok 资源管理错误漏洞 | |
| CVE-2020-13226 | WSO2 API Manager 代码问题漏洞 | |
| CVE-2020-13225 | phpIPAM 跨站脚本漏洞 | |
| CVE-2020-12034 | Rockwell Automation EDS Subsystem SQL注入漏洞 |
No comments yet