CVE-2020-1938
26 documents18 sources
9.8
CVSS
EPSS94.5%(100th)
CISA KEVPublic ExploitExploited in WildCISA Required Action: Apply updates per vendor instructions.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages20 packages
Also affects: Debian Linux 10.0, 8.0, 9.0, Fedora 30, 31, 32
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It ...
🔴Vulnerability Details
5💥Exploits & PoCs
3🔍Detection Rules
2📋Vendor Advisories
6Debian▶
CVE-2020-1938: tomcat9 - When using the Apache JServ Protocol (AJP), care must be taken when trusting inc...↗2020
🕵️Threat Intelligence
5Qualys
▶
Qualys▶
Automatically Discover, Prioritize and Remediate Apache Tomcat AJP File Inclusion Vulnerability (CVE-2020-1938) using Qualys VMDR | Qualys↗2020-03-06