CVE-2020-9484

HIGH NUCLEI

Apache Tomcat < 7.0.108 - Insecure Deserialization

Title source: rule

Description

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.

Exploits (20)

nomisec WORKING POC 212 stars
by threedr3am · poc
https://github.com/threedr3am/tomcat-cluster-session-sync-exp
nomisec WORKING POC 127 stars
by masahiro331 · poc
https://github.com/masahiro331/CVE-2020-9484
nomisec WORKING POC 52 stars
by IdealDreamLast · poc
https://github.com/IdealDreamLast/CVE-2020-9484
nomisec WORKING POC 34 stars
by PenTestical · poc
https://github.com/PenTestical/CVE-2020-9484
nomisec SCANNER 32 stars
by osamahamad · poc
https://github.com/osamahamad/CVE-2020-9484-Mass-Scan
nomisec WORKING POC 24 stars
by 0dayCTF · poc
https://github.com/0dayCTF/CVE-2020-9484
nomisec WORKING POC 16 stars
by d3fudd · poc
https://github.com/d3fudd/CVE-2020-9484_Exploit
nomisec WORKING POC 13 stars
by VICXOR · poc
https://github.com/VICXOR/CVE-2020-9484
nomisec WORKING POC 6 stars
by anjai94 · poc
https://github.com/anjai94/CVE-2020-9484-exploit
nomisec WORKING POC 5 stars
by ColdFusionX · poc
https://github.com/ColdFusionX/CVE-2020-9484
nomisec WORKING POC 5 stars
by RepublicR0K · poc
https://github.com/RepublicR0K/CVE-2020-9484
nomisec SUSPICIOUS 4 stars
by AssassinUKG · poc
https://github.com/AssassinUKG/CVE-2020-9484
github WRITEUP 3 stars
by HxDDD · poc
https://github.com/HxDDD/CVE-PoC/tree/main/Apache/(Session Deserialization) CVE-2020-9484.md
nomisec WORKING POC 1 stars
by savsch · poc
https://github.com/savsch/PoC_CVE-2020-9484
nomisec WORKING POC 1 stars
by qerogram · poc
https://github.com/qerogram/CVE-2020-9484
nomisec WORKING POC
by Disturbante · poc
https://github.com/Disturbante/CVE-2020-9484
gitlab WORKING POC
by milo2012 · poc
https://gitlab.com/milo2012/cve-2020-9484
nomisec WORKING POC
by DXY0411 · poc
https://github.com/DXY0411/CVE-2020-9484
nomisec SCANNER
by DanQMoo · poc
https://github.com/DanQMoo/CVE-2020-9484-Scanner
nomisec WORKING POC
by seanachao · poc
https://github.com/seanachao/CVE-2020-9484

Nuclei Templates (1)

Apache Tomcat Remote Command Execution
HIGHby dwisiswant0
Shodan: title:"Apache Tomcat" || http.title:"apache tomcat" || http.html:"apache tomcat" || cpe:"cpe:2.3:a:apache:tomcat"
FOFA: body="apache tomcat" || title="apache tomcat"

References (42)

... and 22 more

Scores

CVSS v3 7.0
EPSS 0.9333
EPSS Percentile 99.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-502
Status published

Affected Products (50)

apache/tomcat < 7.0.108
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
... and 35 more

Timeline

Published May 20, 2020
Tracked Since Feb 18, 2026