支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2020-9484 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Apache Tomcat 代码问题漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat中存在代码问题漏洞。攻击者可通过控制服务器上文件的内容和名称等方法利用该漏洞执行代码。以下产品及版本受到影响:Apache Tomcat 10.0.0-M1版本至10.0.0-M4版本,9.0.0.0.M1版本至9.0.43之前版本,8.5.0版本至8.5.63之前版本,7.0.0版本至7.0.108之前版本。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
-Apache Tomcat Apache Tomcat 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54, 7.0.0 to 7.0.103 -
二、漏洞 CVE-2020-9484 的公开POC
#POC 描述源链接神龙链接
1tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!https://github.com/threedr3am/tomcat-cluster-session-sync-expPOC详情
2Nonehttps://github.com/masahiro331/CVE-2020-9484POC详情
3利用ceye批量检测CVE-2020-9484https://github.com/seanachao/CVE-2020-9484POC详情
4用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞https://github.com/IdealDreamLast/CVE-2020-9484POC详情
5for Ubuntu 18.04, improve functions.https://github.com/qerogram/CVE-2020-9484POC详情
6CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE https://github.com/osamahamad/CVE-2020-9484-Mass-ScanPOC详情
7Nonehttps://github.com/anjai94/CVE-2020-9484-exploitPOC详情
8Nonehttps://github.com/PenTestical/CVE-2020-9484POC详情
9A smol bash script I threw together pretty quickly to scan for vulnerable versions of the Apache Tomcat RCE. I'll give it some love when I have the time. https://github.com/DanQMoo/CVE-2020-9484-ScannerPOC详情
10Nonehttps://github.com/AssassinUKG/CVE-2020-9484POC详情
11POC for CVE-2020-9484https://github.com/VICXOR/CVE-2020-9484POC详情
12Nonehttps://github.com/DXY0411/CVE-2020-9484POC详情
13Apache Tomcat RCE (CVE-2020-9484)https://github.com/RepublicR0K/CVE-2020-9484POC详情
14POC - Apache Tomcat Deserialization Vulnerability (CVE-2020-9484)https://github.com/ColdFusionX/CVE-2020-9484POC详情
15Exploit for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCEhttps://github.com/d3fudd/CVE-2020-9484_ExploitPOC详情
16small test to prevent sql injections attack. 🔒 CVE-2020-9484https://github.com/pxcs/webLogin-DEVPOC详情
17Remake of CVE-2020-9484 by Pentesticalhttps://github.com/0dayCTF/CVE-2020-9484POC详情
18Bash POC for CVE-2020-9484 that i used in tryhackme challengehttps://github.com/Disturbante/CVE-2020-9484POC详情
19Remake of CVE-2020-9484 by Pentesticalhttps://github.com/deathquote/CVE-2020-9484POC详情
20PoC exploit for CVE-2020-9484, and a vulnerable web application for its demonstrationhttps://github.com/savsch/PoC_CVE-2020-9484POC详情
21When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-9484.yamlPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2020-9484 的情报信息
Please 登录 to view more intelligence information
四、漏洞 CVE-2020-9484 的评论

暂无评论


发表评论