// For flags

CVE-2020-1938

Apache Tomcat Improper Privilege Management Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

18
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.

Cuando se usa el Apache JServ Protocol (AJP), se debe tener cuidado cuando se confía en las conexiones entrantes a Apache Tomcat. Tomcat trata las conexiones de AJP como teniéndoles la mayor confianza que, por ejemplo, una conexión HTTP similar. Si tales conexiones están disponibles para un atacante, pueden ser explotadas de manera sorprendente. En Apache Tomcat versiones 9.0.0.M1 hasta 9.0.0.30, versiones 8.5.0 hasta 8.5.50 y versiones 7.0.0 hasta 7.0.99, Tomcat se envió con un conector de AJP habilitado por defecto que escuchaba sobre todas las direcciones IP configuradas. Se esperaba (y se recomienda en la guía de seguridad) que este conector sea deshabilitado si no es requerido. Este reporte de vulnerabilidad identificó un mecanismo que permitía: - devolver archivos arbitrarios desde cualquier lugar de la aplicación web - procesar cualquier archivo en la aplicación web como JSP. Además, si la aplicación web permitía cargar archivos y almacenarlos dentro de la aplicación web (o el atacante fue capaz de controlar el contenido de la aplicación web por otros medios) y esto, junto con la capacidad de procesar un archivo como JSP, hizo posible una ejecución de código remota. Es importante notar que la mitigación solo es requerida si un puerto AJP es accesible por usuarios no confiables. Los usuarios que deseen adoptar un enfoque de defensa en profundidad y bloquear el vector que permite la devolución de archivos arbitrarios y una ejecución como JSP pueden actualizar a Apache Tomcat versiones 9.0.31, 8.5.51 o 7.0.100 o posterior. Se realizaron un número de cambios en la configuración predeterminada del conector AJP en la versión 9.0.31 para fortalecer la configuración predeterminada. Es probable que los usuarios que actualicen a versiones 9.0.31, 8.5.51 o 7.0.100 o posterior necesitarán llevar a cabo pequeños cambios en sus configuraciones.

CVE-2020-1938 is a file read/inclusion vulnerability in the AJP connector in Apache Tomcat. This is enabled by default with a default configuration port of 8009. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution (RCE).

Apache Tomcat treats Apache JServ Protocol (AJP) connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-12-02 CVE Reserved
  • 2020-02-20 First Exploit
  • 2020-02-24 CVE Published
  • 2022-03-03 Exploited in Wild
  • 2022-03-17 KEV Due Date
  • 2024-08-04 CVE Updated
  • 2024-11-10 EPSS Updated
CWE
  • CWE-285: Improper Authorization
CAPEC
References (71)
URL Tag Source
http://support.blackberry.com/kb/articleDetail?articleNumber=000062739 Third Party Advisory
https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e%40%3Cdev.tomee.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e%40%3Cusers.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1%40%3Cusers.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65%40%3Cusers.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda%40%3Ccommits.tomee.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864%40%3Cusers.tomcat.apache.org%3E Issue Tracking
https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f%40%3Cusers.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97%40%3Ccommits.tomee.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b%40%3Cusers.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c%40%3Cusers.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb%40%3Ccommits.tomee.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794%40%3Cnotifications.ofbiz.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d%40%3Cnotifications.ofbiz.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d%40%3Cdev.tomcat.apache.org%3E Issue Tracking
https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db%40%3Cnotifications.ofbiz.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a%40%3Cusers.tomee.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9%40%3Cusers.tomcat.apache.org%3E Issue Tracking
https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a%40%3Cdev.tomee.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2%40%3Cdev.tomee.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194%40%3Ccommits.tomee.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425%40%3Cnotifications.ofbiz.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b%40%3Cusers.tomcat.apache.org%3E Issue Tracking
https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2%40%3Cusers.tomcat.apache.org%3E Issue Tracking
https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca%40%3Cbugs.httpd.apache.org%3E Mailing List
https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html Mailing List
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html Mailing List
https://security.netapp.com/advisory/ntap-20200226-0002 Third Party Advisory
https://www.chaitin.cn/en/ghostcat
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html 2024-07-24
https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E 2024-07-24
https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1%40%3Cnotifications.ofbiz.apache.org%3E 2024-07-24
https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E 2024-07-24
https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760%40%3Cnotifications.ofbiz.apache.org%3E 2024-07-24
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E 2024-07-24
https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3%40%3Ccommits.tomee.apache.org%3E 2024-07-24
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS 2024-07-24
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG 2024-07-24
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B 2024-07-24
https://security.gentoo.org/glsa/202003-43 2024-07-24
https://www.debian.org/security/2020/dsa-4673 2024-07-24
https://www.debian.org/security/2020/dsa-4680 2024-07-24
https://access.redhat.com/security/cve/CVE-2020-1938 2021-08-11
https://bugzilla.redhat.com/show_bug.cgi?id=1806398 2021-08-11
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Geode
Search vendor "Apache" for product "Geode"
1.12.0
Search vendor "Apache" for product "Geode" and version "1.12.0"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
>= 7.0.0 <= 7.0.99
Search vendor "Apache" for product "Tomcat" and version " >= 7.0.0 <= 7.0.99"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
>= 8.5.0 <= 8.5.50
Search vendor "Apache" for product "Tomcat" and version " >= 8.5.0 <= 8.5.50"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
>= 9.0.0 <= 9.0.30
Search vendor "Apache" for product "Tomcat" and version " >= 9.0.0 <= 9.0.30"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
30
Search vendor "Fedoraproject" for product "Fedora" and version "30"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
31
Search vendor "Fedoraproject" for product "Fedora" and version "31"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
32
Search vendor "Fedoraproject" for product "Fedora" and version "32"
-
Affected
Oracle
Search vendor "Oracle"
Agile Engineering Data Management
Search vendor "Oracle" for product "Agile Engineering Data Management"
6.2.1.0
Search vendor "Oracle" for product "Agile Engineering Data Management" and version "6.2.1.0"
-
Affected
Oracle
Search vendor "Oracle"
Agile Plm
Search vendor "Oracle" for product "Agile Plm"
9.3.3
Search vendor "Oracle" for product "Agile Plm" and version "9.3.3"
-
Affected
Oracle
Search vendor "Oracle"
Agile Plm
Search vendor "Oracle" for product "Agile Plm"
9.3.5
Search vendor "Oracle" for product "Agile Plm" and version "9.3.5"
-
Affected
Oracle
Search vendor "Oracle"
Agile Plm
Search vendor "Oracle" for product "Agile Plm"
9.3.6
Search vendor "Oracle" for product "Agile Plm" and version "9.3.6"
-
Affected
Oracle
Search vendor "Oracle"
Communications Element Manager
Search vendor "Oracle" for product "Communications Element Manager"
8.1.1
Search vendor "Oracle" for product "Communications Element Manager" and version "8.1.1"
-
Affected
Oracle
Search vendor "Oracle"
Communications Element Manager
Search vendor "Oracle" for product "Communications Element Manager"
8.2.0
Search vendor "Oracle" for product "Communications Element Manager" and version "8.2.0"
-
Affected
Oracle
Search vendor "Oracle"
Communications Element Manager
Search vendor "Oracle" for product "Communications Element Manager"
8.2.1
Search vendor "Oracle" for product "Communications Element Manager" and version "8.2.1"
-
Affected
Oracle
Search vendor "Oracle"
Communications Instant Messaging Server
Search vendor "Oracle" for product "Communications Instant Messaging Server"
10.0.1.4.0
Search vendor "Oracle" for product "Communications Instant Messaging Server" and version "10.0.1.4.0"
-
Affected
Oracle
Search vendor "Oracle"
Health Sciences Empirica Inspections
Search vendor "Oracle" for product "Health Sciences Empirica Inspections"
1.0.1.2
Search vendor "Oracle" for product "Health Sciences Empirica Inspections" and version "1.0.1.2"
-
Affected
Oracle
Search vendor "Oracle"
Health Sciences Empirica Signal
Search vendor "Oracle" for product "Health Sciences Empirica Signal"
7.3.3
Search vendor "Oracle" for product "Health Sciences Empirica Signal" and version "7.3.3"
-
Affected
Oracle
Search vendor "Oracle"
Hospitality Guest Access
Search vendor "Oracle" for product "Hospitality Guest Access"
4.2.0
Search vendor "Oracle" for product "Hospitality Guest Access" and version "4.2.0"
-
Affected
Oracle
Search vendor "Oracle"
Hospitality Guest Access
Search vendor "Oracle" for product "Hospitality Guest Access"
4.2.1
Search vendor "Oracle" for product "Hospitality Guest Access" and version "4.2.1"
-
Affected
Oracle
Search vendor "Oracle"
Instantis Enterprisetrack
Search vendor "Oracle" for product "Instantis Enterprisetrack"
>= 17.1 <= 17.3
Search vendor "Oracle" for product "Instantis Enterprisetrack" and version " >= 17.1 <= 17.3"
-
Affected
Oracle
Search vendor "Oracle"
Mysql Enterprise Monitor
Search vendor "Oracle" for product "Mysql Enterprise Monitor"
<= 4.0.12
Search vendor "Oracle" for product "Mysql Enterprise Monitor" and version " <= 4.0.12"
-
Affected
Oracle
Search vendor "Oracle"
Mysql Enterprise Monitor
Search vendor "Oracle" for product "Mysql Enterprise Monitor"
>= 8.0.0 <= 8.0.20
Search vendor "Oracle" for product "Mysql Enterprise Monitor" and version " >= 8.0.0 <= 8.0.20"
-
Affected
Oracle
Search vendor "Oracle"
Siebel Ui Framework
Search vendor "Oracle" for product "Siebel Ui Framework"
<= 20.5
Search vendor "Oracle" for product "Siebel Ui Framework" and version " <= 20.5"
-
Affected
Oracle
Search vendor "Oracle"
Transportation Management
Search vendor "Oracle" for product "Transportation Management"
6.3.7
Search vendor "Oracle" for product "Transportation Management" and version "6.3.7"
-
Affected
Oracle
Search vendor "Oracle"
Workload Manager
Search vendor "Oracle" for product "Workload Manager"
12.2.0.1
Search vendor "Oracle" for product "Workload Manager" and version "12.2.0.1"
-
Affected
Oracle
Search vendor "Oracle"
Workload Manager
Search vendor "Oracle" for product "Workload Manager"
18c
Search vendor "Oracle" for product "Workload Manager" and version "18c"
-
Affected
Oracle
Search vendor "Oracle"
Workload Manager
Search vendor "Oracle" for product "Workload Manager"
19c
Search vendor "Oracle" for product "Workload Manager" and version "19c"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
8.0
Search vendor "Debian" for product "Debian Linux" and version "8.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected
Opensuse
Search vendor "Opensuse"
Leap
Search vendor "Opensuse" for product "Leap"
15.1
Search vendor "Opensuse" for product "Leap" and version "15.1"
-
Affected
Blackberry
Search vendor "Blackberry"
Good Control
Search vendor "Blackberry" for product "Good Control"
<= 5.2.58.38
Search vendor "Blackberry" for product "Good Control" and version " <= 5.2.58.38"
-
Affected
Blackberry
Search vendor "Blackberry"
Workspaces Server
Search vendor "Blackberry" for product "Workspaces Server"
7.0.1
Search vendor "Blackberry" for product "Workspaces Server" and version "7.0.1"
-
Affected
Blackberry
Search vendor "Blackberry"
Workspaces Server
Search vendor "Blackberry" for product "Workspaces Server"
7.1.2
Search vendor "Blackberry" for product "Workspaces Server" and version "7.1.2"
-
Affected
Blackberry
Search vendor "Blackberry"
Workspaces Server
Search vendor "Blackberry" for product "Workspaces Server"
8.1.0
Search vendor "Blackberry" for product "Workspaces Server" and version "8.1.0"
-
Affected
Blackberry
Search vendor "Blackberry"
Workspaces Server
Search vendor "Blackberry" for product "Workspaces Server"
9.0
Search vendor "Blackberry" for product "Workspaces Server" and version "9.0"
-
Affected
Netapp
Search vendor "Netapp"
Data Availability Services
Search vendor "Netapp" for product "Data Availability Services"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand System Manager
Search vendor "Netapp" for product "Oncommand System Manager"
>= 3.0.0 <= 3.1.3
Search vendor "Netapp" for product "Oncommand System Manager" and version " >= 3.0.0 <= 3.1.3"
-
Affected