Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-9484

EPSS 93.46% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-9484

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Tomcat 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat中存在代码问题漏洞。攻击者可通过控制服务器上文件的内容和名称等方法利用该漏洞执行代码。以下产品及版本受到影响:Apache Tomcat 10.0.0-M1版本至10.0.0-M4版本,9.0.0.0.M1版本至9.0.43之前版本,8.5.0版本至8.5.63之前版本,7.0.0版本至7.0.108之前版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-Apache Tomcat Apache Tomcat 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54, 7.0.0 to 7.0.103 -

II. Public POCs for CVE-2020-9484

#POC DescriptionSource LinkShenlong Link
1tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!https://github.com/threedr3am/tomcat-cluster-session-sync-expPOC Details
2Nonehttps://github.com/masahiro331/CVE-2020-9484POC Details
3利用ceye批量检测CVE-2020-9484https://github.com/seanachao/CVE-2020-9484POC Details
4用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞https://github.com/IdealDreamLast/CVE-2020-9484POC Details
5for Ubuntu 18.04, improve functions.https://github.com/qerogram/CVE-2020-9484POC Details
6CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE https://github.com/osamahamad/CVE-2020-9484-Mass-ScanPOC Details
7Nonehttps://github.com/anjai94/CVE-2020-9484-exploitPOC Details
8Nonehttps://github.com/PenTestical/CVE-2020-9484POC Details
9A smol bash script I threw together pretty quickly to scan for vulnerable versions of the Apache Tomcat RCE. I'll give it some love when I have the time. https://github.com/DanQMoo/CVE-2020-9484-ScannerPOC Details
10Nonehttps://github.com/AssassinUKG/CVE-2020-9484POC Details
11POC for CVE-2020-9484https://github.com/VICXOR/CVE-2020-9484POC Details
12Nonehttps://github.com/DXY0411/CVE-2020-9484POC Details
13Apache Tomcat RCE (CVE-2020-9484)https://github.com/RepublicR0K/CVE-2020-9484POC Details
14POC - Apache Tomcat Deserialization Vulnerability (CVE-2020-9484)https://github.com/ColdFusionX/CVE-2020-9484POC Details
15Exploit for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCEhttps://github.com/d3fudd/CVE-2020-9484_ExploitPOC Details
16small test to prevent sql injections attack. 🔒 CVE-2020-9484https://github.com/pxcs/webLogin-DEVPOC Details
17Remake of CVE-2020-9484 by Pentesticalhttps://github.com/0dayCTF/CVE-2020-9484POC Details
18Bash POC for CVE-2020-9484 that i used in tryhackme challengehttps://github.com/Disturbante/CVE-2020-9484POC Details
19Remake of CVE-2020-9484 by Pentesticalhttps://github.com/deathquote/CVE-2020-9484POC Details
20PoC exploit for CVE-2020-9484, and a vulnerable web application for its demonstrationhttps://github.com/savsch/PoC_CVE-2020-9484POC Details
21When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-9484.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-9484

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-05-20 · 17 CVEs total

CVE-2020-13241Microweber 代码问题漏洞
CVE-2020-13249MariaDB Connector/C 安全漏洞
CVE-2020-13246Gitea 安全漏洞
CVE-2020-13239Dolibarr ERP/CRM DMS/ECM模块跨站脚本漏洞
CVE-2020-13240Dolibarr ERP/CRM DMS/ECM模块跨站脚本漏洞
CVE-2020-13231Cacti 跨站请求伪造漏洞
CVE-2020-1955Apache CouchDB 安全漏洞
CVE-2020-13230Cacti 安全漏洞
CVE-2020-5753Signal Private Messenger 信息泄露漏洞
CVE-2020-3956VMware Cloud Director 注入漏洞
CVE-2020-11716多款Panasonic产品安全漏洞
CVE-2020-12835SmartBear Software ReadyAPI 注入漏洞
CVE-2020-13152KDE Amarok 资源管理错误漏洞
CVE-2020-13226WSO2 API Manager 代码问题漏洞
CVE-2020-13225phpIPAM 跨站脚本漏洞
CVE-2020-12034Rockwell Automation EDS Subsystem SQL注入漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2020-9484

No comments yet


Leave a comment