支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%
一、 漏洞 CVE-2020-1938 基础信息
漏洞信息
                                        # N/A

N/A
                                        
神龙判断

是否为 Web 类漏洞:

判断理由:

是。这个漏洞涉及Apache Tomcat的AJP Connector,默认配置中监听所有IP地址,这使得攻击者能够利用AJP协议的高信任级别,执行如返回任意文件或以JSP形式处理文件等操作,进而可能实现远程代码执行。此问题需在网络服务端进行修复或配置更改以减少风险。
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
N/A
来源:美国国家漏洞数据库 NVD
漏洞描述信息
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
N/A
来源:美国国家漏洞数据库 NVD
漏洞标题
Apache Tomcat 安全漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat 7.0.100版本之前的7.*版本、8.5.51版本之前的8.*版本和9.0.31版本之前的9.*版本中的Tomcat AJP协议存在安全漏洞。攻击者可利用该漏洞读取或包含Tomcat上所有webapp目录下的任意文件,如 webapp 配置文件或源代码等。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
其他
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2020-1938 的公开POC
#POC 描述源链接神龙链接
1Nonehttps://github.com/xindongzhuaizhuai/CVE-2020-1938POC详情
2CVE-2020-1938https://github.com/sgdream/CVE-2020-1938POC详情
3CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞pochttps://github.com/nibiwodong/CNVD-2020-10487-Tomcat-ajp-POCPOC详情
4Cnvd-2020-10487 / cve-2020-1938, scanner toolhttps://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-ScannerPOC详情
5CVE-2020-1938漏洞复现https://github.com/laolisafe/CVE-2020-1938POC详情
6Nonehttps://github.com/h7hac9/CVE-2020-1938POC详情
7Tomcat的文件包含及文件读取漏洞利用POChttps://github.com/sv3nbeast/CVE-2020-1938-Tomact-file_include-file_readPOC详情
8在一定条件下可执行命令https://github.com/fairyming/CVE-2020-1938POC详情
9Nonehttps://github.com/dacade/CVE-2020-1938POC详情
10批量扫描TomcatAJP漏洞https://github.com/woaiqiukui/CVE-2020-1938TomcatAjpScannerPOC详情
11Nonehttps://github.com/fatal0/tomcat-cve-2020-1938-checkPOC详情
12CVE-2020-1938https://github.com/ze0r/GhostCat-LFI-expPOC详情
13CNVD-2020-10487 OR CVE-2020-1938 批量验证脚本,批量验证,并自动截图,方便提交及复核https://github.com/delsadan/CNVD-2020-10487-Bulk-verificationPOC详情
14Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938) https://github.com/00theway/Ghostcat-CNVD-2020-10487POC详情
15Learnings on how to verify if vulnerable to Ghostcat (aka CVE-2020-1938)https://github.com/shaunmclernon/ghostcat-verificationPOC详情
16Test Explo for Ghostcat CVE-2020-1938https://github.com/Zaziki1337/Ghostcat-CVE-2020-1938POC详情
17CVE-2020-1938(GhostCat) clean and readable code versionhttps://github.com/w4fz5uck5/CVE-2020-1938-Clean-VersionPOC详情
18批量检测幽灵猫漏洞https://github.com/Just1ceP4rtn3r/CVE-2020-1938-ToolPOC详情
19CVE-2020-1938 / CNVD-2020-1048 Detection Toolshttps://github.com/doggycheng/CNVD-2020-10487POC详情
20This is about CVE-2020-1938https://github.com/I-Runtime-Error/CVE-2020-1938POC详情
21CVE-2020-1938 exploithttps://github.com/Umesh2807/GhostcatPOC详情
22Disables AJP connectors to remediate CVE-2020-1938!https://github.com/MateoSec/ghostcatchPOC详情
23Modified version of auxiliary/admin/http/tomcat_ghostcat, it can Read any filehttps://github.com/acodervic/CVE-2020-1938-MSF-MODULEPOC详情
24Nonehttps://github.com/Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-GhostcatPOC详情
25Nonehttps://github.com/streghstreek/CVE-2020-1938POC详情
26Scanner for CVE-2020-1938https://github.com/Neko-chanQwQ/CVE-2020-1938POC详情
27An implementation of CVE-2020-1938https://github.com/jptr218/ghostcatPOC详情
28-H 192.168.1.1-192.168.5.255https://github.com/einzbernnn/CVE-2020-1938ScanPOC详情
29This is a modified version of the original GhostCat Exploithttps://github.com/YounesTasra-R4z3rSw0rd/CVE-2020-1938POC详情
30cve-2020-1938 Tomcat-Ajp-lfi.git脚本https://github.com/Warelock/cve-2020-1938POC详情
31CVE-2020-1938https://github.com/whatboxapp/GhostCat-LFI-expPOC详情
32This is exploit of CVE-2020-1938 Ghostcat-Apache Tomcat Vulnerabilityhttps://github.com/technicalcorp2/CVE-2020-1938-ExploitPOC详情
33cve-2020-1938 POC, updated versionhttps://github.com/s3nd3rjz/poc-CVE-2020-1938POC详情
34Nonehttps://github.com/WHtig3r/CVE-2020-1938POC详情
35poc-CVE-2020-1938https://github.com/aib0litt/poc-CVE-2020-1938POC详情
36Nonehttps://github.com/hopsypopsy8/CVE-2020-1938-ExploitationPOC详情
37Apache Tomcat vulnerable to Ghostcat (CVE-2020-1938).https://github.com/erickrr-bd/Apache-Tomcat-Ghostcat-VulnerabilityPOC详情
38When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2020/CVE-2020-1938.yamlPOC详情
39Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Tomcat%20AJP%20%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E%20CVE-2020-1938.mdPOC详情
40https://github.com/vulhub/vulhub/blob/master/tomcat/CVE-2020-1938/README.mdPOC详情
41Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)https://github.com/Joshua8821/CNVDPOC详情
42Apache Tomcat AJP Ghostcat (CVE-2020-1938) exploit tool for file disclosure with multi-target scanning, custom wordlists, and upload point detection capabilitieshttps://github.com/abrewer251/CVE-2020-1938_Ghostcat-PoCPOC详情
43Nonehttps://github.com/RedTeam-Rediron/CVE-2020-1938POC详情
三、漏洞 CVE-2020-1938 的情报信息
四、漏洞 CVE-2020-1938 的评论

暂无评论


发表评论