# N/A
N/A
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/xindongzhuaizhuai/CVE-2020-1938 | POC详情 |
| 2 | CVE-2020-1938 | https://github.com/sgdream/CVE-2020-1938 | POC详情 |
| 3 | CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc | https://github.com/nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC | POC详情 |
| 4 | Cnvd-2020-10487 / cve-2020-1938, scanner tool | https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner | POC详情 |
| 5 | CVE-2020-1938漏洞复现 | https://github.com/laolisafe/CVE-2020-1938 | POC详情 |
| 6 | None | https://github.com/h7hac9/CVE-2020-1938 | POC详情 |
| 7 | Tomcat的文件包含及文件读取漏洞利用POC | https://github.com/sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read | POC详情 |
| 8 | 在一定条件下可执行命令 | https://github.com/fairyming/CVE-2020-1938 | POC详情 |
| 9 | None | https://github.com/dacade/CVE-2020-1938 | POC详情 |
| 10 | 批量扫描TomcatAJP漏洞 | https://github.com/woaiqiukui/CVE-2020-1938TomcatAjpScanner | POC详情 |
| 11 | None | https://github.com/fatal0/tomcat-cve-2020-1938-check | POC详情 |
| 12 | CVE-2020-1938 | https://github.com/ze0r/GhostCat-LFI-exp | POC详情 |
| 13 | CNVD-2020-10487 OR CVE-2020-1938 批量验证脚本,批量验证,并自动截图,方便提交及复核 | https://github.com/delsadan/CNVD-2020-10487-Bulk-verification | POC详情 |
| 14 | Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938) | https://github.com/00theway/Ghostcat-CNVD-2020-10487 | POC详情 |
| 15 | Learnings on how to verify if vulnerable to Ghostcat (aka CVE-2020-1938) | https://github.com/shaunmclernon/ghostcat-verification | POC详情 |
| 16 | Test Explo for Ghostcat CVE-2020-1938 | https://github.com/Zaziki1337/Ghostcat-CVE-2020-1938 | POC详情 |
| 17 | CVE-2020-1938(GhostCat) clean and readable code version | https://github.com/w4fz5uck5/CVE-2020-1938-Clean-Version | POC详情 |
| 18 | 批量检测幽灵猫漏洞 | https://github.com/Just1ceP4rtn3r/CVE-2020-1938-Tool | POC详情 |
| 19 | CVE-2020-1938 / CNVD-2020-1048 Detection Tools | https://github.com/doggycheng/CNVD-2020-10487 | POC详情 |
| 20 | This is about CVE-2020-1938 | https://github.com/I-Runtime-Error/CVE-2020-1938 | POC详情 |
| 21 | CVE-2020-1938 exploit | https://github.com/Umesh2807/Ghostcat | POC详情 |
| 22 | Disables AJP connectors to remediate CVE-2020-1938! | https://github.com/MateoSec/ghostcatch | POC详情 |
| 23 | Modified version of auxiliary/admin/http/tomcat_ghostcat, it can Read any file | https://github.com/acodervic/CVE-2020-1938-MSF-MODULE | POC详情 |
| 24 | None | https://github.com/Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat | POC详情 |
| 25 | None | https://github.com/streghstreek/CVE-2020-1938 | POC详情 |
| 26 | Scanner for CVE-2020-1938 | https://github.com/Neko-chanQwQ/CVE-2020-1938 | POC详情 |
| 27 | An implementation of CVE-2020-1938 | https://github.com/jptr218/ghostcat | POC详情 |
| 28 | -H 192.168.1.1-192.168.5.255 | https://github.com/einzbernnn/CVE-2020-1938Scan | POC详情 |
| 29 | This is a modified version of the original GhostCat Exploit | https://github.com/YounesTasra-R4z3rSw0rd/CVE-2020-1938 | POC详情 |
| 30 | cve-2020-1938 Tomcat-Ajp-lfi.git脚本 | https://github.com/Warelock/cve-2020-1938 | POC详情 |
| 31 | CVE-2020-1938 | https://github.com/whatboxapp/GhostCat-LFI-exp | POC详情 |
| 32 | This is exploit of CVE-2020-1938 Ghostcat-Apache Tomcat Vulnerability | https://github.com/technicalcorp2/CVE-2020-1938-Exploit | POC详情 |
| 33 | cve-2020-1938 POC, updated version | https://github.com/s3nd3rjz/poc-CVE-2020-1938 | POC详情 |
| 34 | None | https://github.com/WHtig3r/CVE-2020-1938 | POC详情 |
| 35 | poc-CVE-2020-1938 | https://github.com/aib0litt/poc-CVE-2020-1938 | POC详情 |
| 36 | None | https://github.com/hopsypopsy8/CVE-2020-1938-Exploitation | POC详情 |
| 37 | Apache Tomcat vulnerable to Ghostcat (CVE-2020-1938). | https://github.com/erickrr-bd/Apache-Tomcat-Ghostcat-Vulnerability | POC详情 |
| 38 | When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2020/CVE-2020-1938.yaml | POC详情 |
| 39 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Tomcat%20AJP%20%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E%20CVE-2020-1938.md | POC详情 |
| 40 | https://github.com/vulhub/vulhub/blob/master/tomcat/CVE-2020-1938/README.md | POC详情 | |
| 41 | Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938) | https://github.com/Joshua8821/CNVD | POC详情 |
| 42 | Apache Tomcat AJP Ghostcat (CVE-2020-1938) exploit tool for file disclosure with multi-target scanning, custom wordlists, and upload point detection capabilities | https://github.com/abrewer251/CVE-2020-1938_Ghostcat-PoC | POC详情 |
| 43 | None | https://github.com/RedTeam-Rediron/CVE-2020-1938 | POC详情 |
标题: Apache Software Foundation Security Report: 2020-Apache Mail Archives -- 🔗来源链接
标签:mailing-listx_refsource_MLIST
神龙速读:
## 关键信息摘要
### 漏洞统计
- **2020年总共收到18,000封邮件**
- **经过垃圾邮件过滤和线程分组后,处理了946条非垃圾邮件线程(2019年为620条)**
### 漏洞报告分类
- **27%的线程是关于Apache许可证的误解**
- **23%的线程是关于非安全问题的支持请求**
- **10%的线程是关于Apache网站的误报**
### 新报告的漏洞
- **2020年共报告了376个新的漏洞(2019年为320个)**
- **涉及101个顶级项目**
### 值得注意的事件
- **Apache Tomcat的CVE-2020-1938(Ghostcat)**:引起媒体关注,但仅影响未受保护的AJP连接器
- **Apache Struts2的CVE-2017-5638**:2017年披露的远程代码执行漏洞,2020年被利用
- **Apache Guacamole的CVE-2020-9497和CVE-2020-9498**:涉及RDP相关问题
- **Apache Struts的CVE-2019-0230**:可能导致任意代码执行
### 时间线
- **分类:** 目标在三天内处理邮件
- **调查:** 尝试在90天内完成分类和调查
- 固定:依赖项目自身的发布时间表
### 其他
- **2020年分配了151个CVE名称(2019年为122个)**
- **ASF安全委员会与项目团队紧密合作,确保安全问题得到妥善处理**
标题: [Bug 53098] mod_proxy_ajp: patch to set worker secret passed to tomcat-Apache Mail Archives -- 🔗来源链接
标签:mailing-listx_refsource_MLIST
标题: [jira] [Commented] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)-Apache Mail Archives -- 🔗来源链接
标签:mailing-listx_refsource_MLIST
神龙速读:
### 关键信息
- **漏洞ID**: OFBIZ-11407
- **漏洞详情**: Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)
- **提交情况**: Commit 227ecf8023a13789a7ed739807e1d93ee7891e0c in ofbiz-plugins's branch refs/heads/release17.12 from Deepak Dixit
- **相关链接**:
- [https://issues.apache.org/jira/browse/OFBIZ-11407?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17046672#comment-17046672](https://issues.apache.org/jira/browse/OFBIZ-11407?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17046672#comment-17046672)
- [https://gitbox.apache.org/repos/asf?p=ofbiz-plugins.git;h=227ecf8](https://gitbox.apache.org/repos/asf?p=ofbiz-plugins.git;h=227ecf8)
- **未更新的依赖**: tomcat-embed-websocket dependencies not updated (v8.3.4#803005)
暂无评论