CVE-2020-1938

CRITICAL KEV NUCLEI

Apache Geode < 7.0.100 - Remote Code Execution

Title source: rule

Description

When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.

Exploits (42)

nomisec WORKING POC 404 stars
by 00theway · remote
https://github.com/00theway/Ghostcat-CNVD-2020-10487
nomisec WORKING POC 292 stars
by bkfish · infoleak
https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner
nomisec WORKING POC 284 stars
by lizhianyuguangming · remote
https://github.com/lizhianyuguangming/TomcatScanPro
nomisec WORKING POC 250 stars
by tpt11fb · poc
https://github.com/tpt11fb/AttackTomcat
nomisec WORKING POC 52 stars
by sv3nbeast · remote
https://github.com/sv3nbeast/CVE-2020-1938-Tomact-file_include-file_read
nomisec WORKING POC 45 stars
by xindongzhuaizhuai · infoleak
https://github.com/xindongzhuaizhuai/CVE-2020-1938
nomisec WRITEUP 38 stars
by laolisafe · poc
https://github.com/laolisafe/CVE-2020-1938
nomisec WORKING POC 16 stars
by Hancheng-Lei · infoleak
https://github.com/Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat
nomisec SCANNER 15 stars
by woaiqiukui · poc
https://github.com/woaiqiukui/CVE-2020-1938TomcatAjpScanner
nomisec WORKING POC 11 stars
by fairyming · poc
https://github.com/fairyming/CVE-2020-1938
nomisec WORKING POC 9 stars
by dacade · poc
https://github.com/dacade/CVE-2020-1938
nomisec WORKING POC 8 stars
by doggycheng · infoleak
https://github.com/doggycheng/CNVD-2020-10487
nomisec SCANNER 7 stars
by fatal0 · poc
https://github.com/fatal0/tomcat-cve-2020-1938-check
nomisec WORKING POC 6 stars
by w4fz5uck5 · infoleak
https://github.com/w4fz5uck5/CVE-2020-1938-Clean-Version
github WORKING POC 5 stars
by dacade · pythonpoc
https://github.com/dacade/CVE-POC/tree/master/CVE-2020-1938
nomisec WORKING POC 3 stars
by YounesTasra-R4z3rSw0rd · infoleak
https://github.com/YounesTasra-R4z3rSw0rd/CVE-2020-1938
nomisec WORKING POC 3 stars
by Just1ceP4rtn3r · poc
https://github.com/Just1ceP4rtn3r/CVE-2020-1938-Tool
nomisec WORKING POC 3 stars
by delsadan · poc
https://github.com/delsadan/CNVD-2020-10487-Bulk-verification
nomisec WRITEUP 2 stars
by h7hac9 · poc
https://github.com/h7hac9/CVE-2020-1938
nomisec WORKING POC 2 stars
by Warelock · remote
https://github.com/Warelock/cve-2020-1938
nomisec WORKING POC 2 stars
by sgdream · poc
https://github.com/sgdream/CVE-2020-1938
nomisec WRITEUP 1 stars
by shaunmclernon · poc
https://github.com/shaunmclernon/ghostcat-verification
nomisec WRITEUP 1 stars
by streghstreek · poc
https://github.com/streghstreek/CVE-2020-1938
nomisec SCANNER 1 stars
by Neko-chanQwQ · poc
https://github.com/Neko-chanQwQ/CVE-2020-1938
nomisec WORKING POC 1 stars
by jptr218 · infoleak
https://github.com/jptr218/ghostcat
github WORKING POC
by Oracle-Security · pythonpoc
https://github.com/Oracle-Security/Weaponized-CVEs/tree/main/CVE-2020-1938.py
nomisec WORKING POC
by whatboxapp · poc
https://github.com/whatboxapp/GhostCat-LFI-exp
nomisec WORKING POC
by MateoSec · poc
https://github.com/MateoSec/ghostcatch
nomisec STUB
by Umesh2807 · poc
https://github.com/Umesh2807/Ghostcat
nomisec WRITEUP
by Joshua8821 · poc
https://github.com/Joshua8821/CNVD
nomisec WORKING POC
by RedTeam-Rediron · poc
https://github.com/RedTeam-Rediron/CVE-2020-1938
nomisec WORKING POC
by hopsypopsy8 · poc
https://github.com/hopsypopsy8/CVE-2020-1938-Exploitation
nomisec WORKING POC
by acodervic · infoleak
https://github.com/acodervic/CVE-2020-1938-MSF-MODULE
nomisec WORKING POC
by abrewer251 · remote
https://github.com/abrewer251/CVE-2020-1938_Ghostcat-PoC
nomisec NO CODE
by I-Runtime-Error · poc
https://github.com/I-Runtime-Error/CVE-2020-1938
vulncheck_xdb WORKING POC
infoleak
https://github.com/WHtig3r/CVE-2020-1938
exploitdb WORKING POC
by YDHCUI · pythonwebappsmultiple
https://www.exploit-db.com/exploits/48143
metasploit WORKING POC
by A Security Researcher of Chaitin Tech, SunCSR Team · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/tomcat_ghostcat.rb
exploitdb WORKING POC VERIFIED
by SunCSR · rubywebappsmultiple
https://www.exploit-db.com/exploits/49039
vulncheck_xdb WORKING POC
remote
https://github.com/LandGrey/ClassHound

Nuclei Templates (1)

Ghostcat - Apache Tomcat - AJP File Read/Inclusion Vulnerability
CRITICALby milo2012
Shodan: title:"Apache Tomcat" || http.title:"apache tomcat"
FOFA: title="apache tomcat"

References (52)

... and 32 more

Scores

CVSS v3 9.8
EPSS 0.9447
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2022-03-03
VulnCheck KEV 2020-04-15
InTheWild.io 2020-04-15
ENISA EUVD EUVD-2020-0481

Classification

Status published

Affected Products (36)

apache/geode
apache/tomcat < 7.0.100
fedoraproject/fedora
fedoraproject/fedora
fedoraproject/fedora
oracle/agile_engineering_data_management
oracle/agile_plm
oracle/agile_plm
oracle/agile_plm
oracle/communications_element_manager
oracle/communications_element_manager
oracle/communications_element_manager
oracle/communications_instant_messaging_server
oracle/health_sciences_empirica_inspections
oracle/health_sciences_empirica_signal
... and 21 more

Timeline

Published Feb 24, 2020
KEV Added Mar 03, 2022
Tracked Since Feb 18, 2026