cvelist/2020/1xxx/CVE-2020-1938.json

318 lines
19 KiB
JSON
Raw Normal View History

2019-12-02 23:01:00 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-1938",
2020-02-24 22:01:04 +00:00
"ASSIGNER": "security@apache.org",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apache",
"product": {
"product_data": [
{
"product_name": "Apache Tomcat",
"version": {
"version_data": [
{
"version_value": "Apache Tomcat 9.0.0.M1 to 9.0.0.30"
},
{
"version_value": "8.5.0 to 8.5.50"
},
{
"version_value": "7.0.0 to 7.0.99"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "AJP Request Injection leading to possible Remote Code Execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MLIST",
"name": "[tomcat-announce] 20200224 [SECURITY] CVE-2020-1938 AJP Request Injection and potential Remote Code Execution",
"url": "https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E"
2020-02-25 09:01:11 +00:00
},
{
"refsource": "MLIST",
"name": "[ofbiz-notifications] 20200225 [jira] [Commented] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)",
"url": "https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db@%3Cnotifications.ofbiz.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[ofbiz-notifications] 20200225 [jira] [Updated] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)",
"url": "https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E"
2020-02-26 18:01:10 +00:00
},
2020-02-27 16:01:05 +00:00
{
"refsource": "MLIST",
"name": "[ofbiz-commits] 20200227 [ofbiz-plugins] branch release17.12 updated: Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938) (OFBIZ-11407)",
"url": "https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7@%3Ccommits.ofbiz.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[ofbiz-notifications] 20200227 [jira] [Commented] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)",
"url": "https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794@%3Cnotifications.ofbiz.apache.org%3E"
2020-02-28 13:01:16 +00:00
},
{
"refsource": "MLIST",
"name": "[ofbiz-notifications] 20200228 [jira] [Commented] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)",
"url": "https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425@%3Cnotifications.ofbiz.apache.org%3E"
2020-02-28 16:01:14 +00:00
},
{
"refsource": "MLIST",
"name": "[ofbiz-notifications] 20200228 [jira] [Comment Edited] (OFBIZ-11407) Upgrade Tomcat from 9.0.29 to 9.0.31 (CVE-2020-1938)",
"url": "https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522@%3Cnotifications.ofbiz.apache.org%3E"
2020-03-02 01:01:07 +00:00
},
{
"refsource": "MLIST",
"name": "[tomcat-users] 20200301 Re: [SECURITY] CVE-2020-1938 AJP Request Injection and potential Remote Code Execution",
"url": "https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9@%3Cusers.tomcat.apache.org%3E"
2020-03-02 12:01:05 +00:00
},
{
"refsource": "MLIST",
"name": "[tomcat-users] 20200302 Re: AW: [SECURITY] CVE-2020-1938 AJP Request Injection and potentialRemote Code Execution",
"url": "https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[tomcat-users] 20200302 AW: [SECURITY] CVE-2020-1938 AJP Request Injection and potentialRemote Code Execution",
"url": "https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[tomcat-users] 20200302 Re: [SECURITY] CVE-2020-1938 AJP Request Injection and potential Remote Code Execution",
"url": "https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E"
2020-03-04 13:01:18 +00:00
},
{
"refsource": "MLIST",
"name": "[tomcat-users] 20200304 Re: Fix for CVE-2020-1938",
"url": "https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864@%3Cusers.tomcat.apache.org%3E"
2020-03-04 14:01:08 +00:00
},
{
"refsource": "MLIST",
"name": "[tomcat-dev] 20200304 Re: Tagging 10.0.x, 9.0.x, 8.5.x",
"url": "https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d@%3Cdev.tomcat.apache.org%3E"
2020-03-04 20:01:23 +00:00
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200304 [SECURITY] [DLA 2133-1] tomcat7 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html"
2020-03-05 09:01:16 +00:00
},
{
"refsource": "MLIST",
"name": "[tomcat-users] 20200305 Aw: Re: Fix for CVE-2020-1938",
"url": "https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2@%3Cusers.tomcat.apache.org%3E"
2020-03-09 16:01:18 +00:00
},
{
"refsource": "MLIST",
"name": "[tomcat-users] 20200305 Re: Aw: Re: Fix for CVE-2020-1938",
"url": "https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b@%3Cusers.tomcat.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[tomcat-dev] 20200309 [Bug 64206] Answer file not being used",
"url": "https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6@%3Cdev.tomcat.apache.org%3E"
2020-03-10 00:01:09 +00:00
},
{
"refsource": "MLIST",
"name": "[tomcat-users] 20200309 Re: Apache Tomcat AJP File Inclusion Vulnerability (unauthenticated check)",
"url": "https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c@%3Cusers.tomcat.apache.org%3E"
2020-03-10 10:01:14 +00:00
},
{
"refsource": "MLIST",
"name": "[tomcat-users] 20200310 Aw: Re: Re: Fix for CVE-2020-1938",
"url": "https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f@%3Cusers.tomcat.apache.org%3E"
2020-03-10 11:01:15 +00:00
},
{
"refsource": "MLIST",
"name": "[tomcat-users] 20200310 Re: Re: Re: Fix for CVE-2020-1938",
"url": "https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f@%3Cusers.tomcat.apache.org%3E"
2020-03-11 12:01:25 +00:00
},
{
"refsource": "MLIST",
"name": "[tomee-dev] 20200311 CVE-2020-1938 on Tomcat 9.0.30 / TomEE 8.0.1",
"url": "https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e@%3Cdev.tomee.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[tomee-dev] 20200311 Re: CVE-2020-1938 on Tomcat 9.0.30 / TomEE 8.0.1",
"url": "https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a@%3Cdev.tomee.apache.org%3E"
2020-03-15 22:01:14 +00:00
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0345",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html"
2020-03-16 14:01:16 +00:00
},
{
"refsource": "MLIST",
"name": "[tomee-dev] 20200316 RE: CVE-2020-8840 on TomEE 8.0.1",
"url": "https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E"
2020-03-19 11:01:13 +00:00
},
{
"refsource": "MLIST",
"name": "[httpd-bugs] 20200319 [Bug 53098] mod_proxy_ajp: patch to set worker secret passed to tomcat",
"url": "https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca@%3Cbugs.httpd.apache.org%3E"
2020-03-19 20:01:14 +00:00
},
{
"refsource": "GENTOO",
"name": "GLSA-202003-43",
"url": "https://security.gentoo.org/glsa/202003-43"
2020-03-20 11:01:18 +00:00
},
{
"refsource": "MLIST",
"name": "[tomee-commits] 20200320 [jira] [Updated] (TOMEE-2789) TomEE plus(7.0.7) is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.",
"url": "https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194@%3Ccommits.tomee.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[tomee-commits] 20200320 [jira] [Created] (TOMEE-2789) TomEE plus is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.",
"url": "https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3@%3Ccommits.tomee.apache.org%3E"
2020-03-23 11:01:17 +00:00
},
{
"refsource": "MLIST",
"name": "[tomee-commits] 20200323 [jira] [Commented] (TOMEE-2789) TomEE plus(7.0.7) is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.",
"url": "https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb@%3Ccommits.tomee.apache.org%3E"
2020-03-31 02:01:14 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-0e42878ba7",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS/"
2020-04-02 11:01:14 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-c870aa8378",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B/"
2020-04-02 12:01:38 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-04ac174fa9",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG/"
2020-04-13 20:01:14 +00:00
},
{
"refsource": "MLIST",
"name": "[tomcat-users] 20200413 RE: Alternatives for AJP",
"url": "https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65@%3Cusers.tomcat.apache.org%3E"
2020-04-16 19:04:07 +00:00
},
2020-05-02 00:01:14 +00:00
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0597",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html"
2020-05-04 12:01:22 +00:00
},
{
"refsource": "DEBIAN",
"name": "DSA-4673",
"url": "https://www.debian.org/security/2020/dsa-4673"
2020-05-07 13:01:13 +00:00
},
{
"refsource": "DEBIAN",
"name": "DSA-4680",
"url": "https://www.debian.org/security/2020/dsa-4680"
2020-05-28 20:01:31 +00:00
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html"
2020-06-26 00:01:19 +00:00
},
{
"refsource": "MLIST",
"name": "[tomcat-dev] 20200625 svn commit: r1879208 - in /tomcat/site/trunk: docs/security-10.html docs/security-8.html docs/security-9.html xdocs/security-10.xml xdocs/security-8.xml xdocs/security-9.xml",
"url": "https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E"
2020-06-28 12:01:17 +00:00
},
{
"refsource": "MLIST",
"name": "[ofbiz-notifications] 20200628 [jira] [Updated] (OFBIZ-11847) CLONE - Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)",
"url": "https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[ofbiz-notifications] 20200628 [jira] [Created] (OFBIZ-11847) CLONE - Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)",
"url": "https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E"
Bill Situ <Bill.Situ@Oracle.com> On branch cna/Oracle/CPU2020Jul3rdParty Changes to be committed: modified: 2015/7xxx/CVE-2015-7501.json modified: 2015/8xxx/CVE-2015-8607.json modified: 2015/8xxx/CVE-2015-8608.json modified: 2015/9xxx/CVE-2015-9251.json modified: 2016/0xxx/CVE-2016-0701.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/1xxx/CVE-2016-1181.json modified: 2016/1xxx/CVE-2016-1182.json modified: 2016/1xxx/CVE-2016-1923.json modified: 2016/1xxx/CVE-2016-1924.json modified: 2016/2xxx/CVE-2016-2183.json modified: 2016/2xxx/CVE-2016-2381.json modified: 2016/3xxx/CVE-2016-3183.json modified: 2016/4xxx/CVE-2016-4000.json modified: 2016/4xxx/CVE-2016-4796.json modified: 2016/4xxx/CVE-2016-4797.json modified: 2016/5xxx/CVE-2016-5017.json modified: 2016/5xxx/CVE-2016-5019.json modified: 2016/6xxx/CVE-2016-6306.json modified: 2016/6xxx/CVE-2016-6814.json modified: 2016/8xxx/CVE-2016-8332.json modified: 2016/8xxx/CVE-2016-8610.json modified: 2016/9xxx/CVE-2016-9112.json modified: 2016/9xxx/CVE-2016-9840.json modified: 2016/9xxx/CVE-2016-9841.json modified: 2016/9xxx/CVE-2016-9842.json modified: 2016/9xxx/CVE-2016-9843.json modified: 2017/0xxx/CVE-2017-0861.json modified: 2017/12xxx/CVE-2017-12610.json modified: 2017/12xxx/CVE-2017-12626.json modified: 2017/12xxx/CVE-2017-12814.json modified: 2017/12xxx/CVE-2017-12837.json modified: 2017/12xxx/CVE-2017-12883.json modified: 2017/15xxx/CVE-2017-15265.json modified: 2017/15xxx/CVE-2017-15708.json modified: 2017/5xxx/CVE-2017-5637.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2018/1000xxx/CVE-2018-1000004.json modified: 2018/1000xxx/CVE-2018-1000632.json modified: 2018/10xxx/CVE-2018-10237.json modified: 2018/10xxx/CVE-2018-10675.json modified: 2018/10xxx/CVE-2018-10872.json modified: 2018/10xxx/CVE-2018-10901.json modified: 2018/11xxx/CVE-2018-11039.json modified: 2018/11xxx/CVE-2018-11040.json modified: 2018/11xxx/CVE-2018-11054.json modified: 2018/11xxx/CVE-2018-11055.json modified: 2018/11xxx/CVE-2018-11056.json modified: 2018/11xxx/CVE-2018-11057.json modified: 2018/11xxx/CVE-2018-11058.json modified: 2018/11xxx/CVE-2018-11776.json modified: 2018/12xxx/CVE-2018-12015.json modified: 2018/12xxx/CVE-2018-12023.json modified: 2018/12xxx/CVE-2018-12207.json modified: 2018/15xxx/CVE-2018-15756.json modified: 2018/15xxx/CVE-2018-15769.json modified: 2018/17xxx/CVE-2018-17190.json modified: 2018/17xxx/CVE-2018-17196.json modified: 2018/18xxx/CVE-2018-18311.json modified: 2018/18xxx/CVE-2018-18312.json modified: 2018/18xxx/CVE-2018-18313.json modified: 2018/18xxx/CVE-2018-18314.json modified: 2018/1xxx/CVE-2018-1199.json modified: 2018/1xxx/CVE-2018-1257.json modified: 2018/1xxx/CVE-2018-1258.json modified: 2018/1xxx/CVE-2018-1270.json modified: 2018/1xxx/CVE-2018-1271.json modified: 2018/1xxx/CVE-2018-1272.json modified: 2018/1xxx/CVE-2018-1275.json modified: 2018/1xxx/CVE-2018-1288.json modified: 2018/3xxx/CVE-2018-3620.json modified: 2018/3xxx/CVE-2018-3639.json modified: 2018/3xxx/CVE-2018-3646.json modified: 2018/3xxx/CVE-2018-3665.json modified: 2018/3xxx/CVE-2018-3693.json modified: 2018/5xxx/CVE-2018-5390.json modified: 2018/6xxx/CVE-2018-6616.json modified: 2018/6xxx/CVE-2018-6797.json modified: 2018/6xxx/CVE-2018-6798.json modified: 2018/6xxx/CVE-2018-6913.json modified: 2018/7xxx/CVE-2018-7566.json modified: 2018/8xxx/CVE-2018-8012.json modified: 2018/8xxx/CVE-2018-8013.json modified: 2018/8xxx/CVE-2018-8032.json modified: 2018/8xxx/CVE-2018-8088.json modified: 2019/0xxx/CVE-2019-0188.json modified: 2019/0xxx/CVE-2019-0201.json modified: 2019/0xxx/CVE-2019-0220.json modified: 2019/0xxx/CVE-2019-0222.json modified: 2019/0xxx/CVE-2019-0227.json modified: 2019/10xxx/CVE-2019-10081.json modified: 2019/10xxx/CVE-2019-10082.json modified: 2019/10xxx/CVE-2019-10086.json modified: 2019/10xxx/CVE-2019-10092.json modified: 2019/10xxx/CVE-2019-10097.json modified: 2019/10xxx/CVE-2019-10192.json modified: 2019/10xxx/CVE-2019-10193.json modified: 2019/10xxx/CVE-2019-10246.json modified: 2019/10xxx/CVE-2019-10247.json modified: 2019/11xxx/CVE-2019-11358.json modified: 2019/12xxx/CVE-2019-12086.json modified: 2019/12xxx/CVE-2019-12384.json modified: 2019/12xxx/CVE-2019-12402.json modified: 2019/12xxx/CVE-2019-12415.json modified: 2019/12xxx/CVE-2019-12423.json modified: 2019/12xxx/CVE-2019-12814.json modified: 2019/12xxx/CVE-2019-12973.json modified: 2019/13xxx/CVE-2019-13990.json modified: 2019/14xxx/CVE-2019-14379.json modified: 2019/14xxx/CVE-2019-14439.json modified: 2019/14xxx/CVE-2019-14540.json modified: 2019/14xxx/CVE-2019-14862.json modified: 2019/14xxx/CVE-2019-14893.json modified: 2019/16xxx/CVE-2019-16056.json modified: 2019/16xxx/CVE-2019-16335.json modified: 2019/16xxx/CVE-2019-16935.json modified: 2019/16xxx/CVE-2019-16942.json modified: 2019/16xxx/CVE-2019-16943.json modified: 2019/17xxx/CVE-2019-17091.json modified: 2019/17xxx/CVE-2019-17267.json modified: 2019/17xxx/CVE-2019-17359.json modified: 2019/17xxx/CVE-2019-17531.json modified: 2019/17xxx/CVE-2019-17560.json modified: 2019/17xxx/CVE-2019-17561.json modified: 2019/17xxx/CVE-2019-17563.json modified: 2019/17xxx/CVE-2019-17569.json modified: 2019/17xxx/CVE-2019-17571.json modified: 2019/17xxx/CVE-2019-17573.json modified: 2019/19xxx/CVE-2019-19956.json modified: 2019/1xxx/CVE-2019-1547.json modified: 2019/1xxx/CVE-2019-1549.json modified: 2019/1xxx/CVE-2019-1551.json modified: 2019/1xxx/CVE-2019-1552.json modified: 2019/1xxx/CVE-2019-1563.json modified: 2019/20xxx/CVE-2019-20330.json modified: 2019/20xxx/CVE-2019-20388.json modified: 2019/3xxx/CVE-2019-3738.json modified: 2019/3xxx/CVE-2019-3739.json modified: 2019/3xxx/CVE-2019-3740.json modified: 2019/5xxx/CVE-2019-5427.json modified: 2019/5xxx/CVE-2019-5489.json modified: 2019/8xxx/CVE-2019-8457.json modified: 2020/10xxx/CVE-2020-10672.json modified: 2020/10xxx/CVE-2020-10673.json modified: 2020/10xxx/CVE-2020-10683.json modified: 2020/10xxx/CVE-2020-10968.json modified: 2020/10xxx/CVE-2020-10969.json modified: 2020/11xxx/CVE-2020-11022.json modified: 2020/11xxx/CVE-2020-11023.json modified: 2020/11xxx/CVE-2020-11080.json modified: 2020/11xxx/CVE-2020-11111.json modified: 2020/11xxx/CVE-2020-11112.json modified: 2020/11xxx/CVE-2020-11113.json modified: 2020/11xxx/CVE-2020-11619.json modified: 2020/11xxx/CVE-2020-11620.json modified: 2020/11xxx/CVE-2020-11655.json modified: 2020/11xxx/CVE-2020-11656.json modified: 2020/13xxx/CVE-2020-13434.json modified: 2020/13xxx/CVE-2020-13435.json modified: 2020/13xxx/CVE-2020-13630.json modified: 2020/13xxx/CVE-2020-13631.json modified: 2020/13xxx/CVE-2020-13632.json modified: 2020/1xxx/CVE-2020-1927.json modified: 2020/1xxx/CVE-2020-1934.json modified: 2020/1xxx/CVE-2020-1935.json modified: 2020/1xxx/CVE-2020-1938.json modified: 2020/1xxx/CVE-2020-1941.json modified: 2020/1xxx/CVE-2020-1945.json modified: 2020/1xxx/CVE-2020-1950.json modified: 2020/1xxx/CVE-2020-1951.json modified: 2020/1xxx/CVE-2020-1967.json modified: 2020/5xxx/CVE-2020-5258.json modified: 2020/5xxx/CVE-2020-5397.json modified: 2020/5xxx/CVE-2020-5398.json modified: 2020/6xxx/CVE-2020-6851.json modified: 2020/7xxx/CVE-2020-7059.json modified: 2020/7xxx/CVE-2020-7060.json modified: 2020/7xxx/CVE-2020-7595.json modified: 2020/8xxx/CVE-2020-8112.json modified: 2020/8xxx/CVE-2020-8172.json modified: 2020/9xxx/CVE-2020-9327.json modified: 2020/9xxx/CVE-2020-9484.json modified: 2020/9xxx/CVE-2020-9488.json modified: 2020/9xxx/CVE-2020-9546.json modified: 2020/9xxx/CVE-2020-9547.json modified: 2020/9xxx/CVE-2020-9548.json
2020-07-14 13:55:31 -07:00
},
{
2020-07-15 03:02:07 +00:00
"url": "https://www.oracle.com/security-alerts/cpujul2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200226-0002/",
"url": "https://security.netapp.com/advisory/ntap-20200226-0002/"
},
{
"refsource": "CONFIRM",
"name": "http://support.blackberry.com/kb/articleDetail?articleNumber=000062739",
"url": "http://support.blackberry.com/kb/articleDetail?articleNumber=000062739"
2020-07-23 22:01:25 +00:00
},
{
"refsource": "MLIST",
"name": "[tomee-users] 20200723 Re: TomEE on Docker",
"url": "https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a@%3Cusers.tomee.apache.org%3E"
2020-08-31 14:01:29 +00:00
},
{
"refsource": "MLIST",
"name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12",
"url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E"
Bill Situ <Bill.Situ@Oracle.com> On branch cna/Oracle/CPU2020Oct3rdparty Changes to be committed: modified: 2013/7xxx/CVE-2013-7285.json modified: 2015/1xxx/CVE-2015-1832.json modified: 2015/9xxx/CVE-2015-9251.json modified: 2016/0xxx/CVE-2016-0701.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/1000xxx/CVE-2016-1000338.json modified: 2016/1000xxx/CVE-2016-1000339.json modified: 2016/1000xxx/CVE-2016-1000340.json modified: 2016/1000xxx/CVE-2016-1000341.json modified: 2016/1000xxx/CVE-2016-1000342.json modified: 2016/1000xxx/CVE-2016-1000343.json modified: 2016/1000xxx/CVE-2016-1000344.json modified: 2016/1000xxx/CVE-2016-1000345.json modified: 2016/1000xxx/CVE-2016-1000346.json modified: 2016/1000xxx/CVE-2016-1000352.json modified: 2016/2xxx/CVE-2016-2167.json modified: 2016/2xxx/CVE-2016-2168.json modified: 2016/2xxx/CVE-2016-2183.json modified: 2016/2xxx/CVE-2016-2510.json modified: 2016/3xxx/CVE-2016-3189.json modified: 2016/4xxx/CVE-2016-4800.json modified: 2016/5xxx/CVE-2016-5000.json modified: 2016/5xxx/CVE-2016-5725.json modified: 2016/6xxx/CVE-2016-6306.json modified: 2016/8xxx/CVE-2016-8610.json modified: 2016/8xxx/CVE-2016-8734.json modified: 2017/12xxx/CVE-2017-12626.json modified: 2017/13xxx/CVE-2017-13098.json modified: 2017/15xxx/CVE-2017-15095.json modified: 2017/17xxx/CVE-2017-17485.json modified: 2017/3xxx/CVE-2017-3164.json modified: 2017/5xxx/CVE-2017-5644.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/5xxx/CVE-2017-5662.json modified: 2017/7xxx/CVE-2017-7525.json modified: 2017/7xxx/CVE-2017-7656.json modified: 2017/7xxx/CVE-2017-7657.json modified: 2017/7xxx/CVE-2017-7658.json modified: 2017/9xxx/CVE-2017-9096.json modified: 2017/9xxx/CVE-2017-9735.json modified: 2017/9xxx/CVE-2017-9800.json modified: 2018/1000xxx/CVE-2018-1000180.json modified: 2018/1000xxx/CVE-2018-1000613.json modified: 2018/1000xxx/CVE-2018-1000873.json modified: 2018/11xxx/CVE-2018-11054.json modified: 2018/11xxx/CVE-2018-11055.json modified: 2018/11xxx/CVE-2018-11056.json modified: 2018/11xxx/CVE-2018-11057.json modified: 2018/11xxx/CVE-2018-11058.json modified: 2018/11xxx/CVE-2018-11307.json modified: 2018/12xxx/CVE-2018-12022.json modified: 2018/12xxx/CVE-2018-12023.json modified: 2018/12xxx/CVE-2018-12536.json modified: 2018/12xxx/CVE-2018-12538.json modified: 2018/12xxx/CVE-2018-12545.json modified: 2018/14xxx/CVE-2018-14718.json modified: 2018/15xxx/CVE-2018-15769.json modified: 2018/17xxx/CVE-2018-17196.json modified: 2018/20xxx/CVE-2018-20843.json modified: 2018/3xxx/CVE-2018-3693.json modified: 2018/5xxx/CVE-2018-5382.json modified: 2018/5xxx/CVE-2018-5968.json modified: 2018/7xxx/CVE-2018-7489.json modified: 2018/8xxx/CVE-2018-8013.json modified: 2018/8xxx/CVE-2018-8088.json modified: 2019/0xxx/CVE-2019-0192.json modified: 2019/0xxx/CVE-2019-0201.json modified: 2019/1010xxx/CVE-2019-1010239.json modified: 2019/10xxx/CVE-2019-10072.json modified: 2019/10xxx/CVE-2019-10097.json modified: 2019/10xxx/CVE-2019-10173.json modified: 2019/10xxx/CVE-2019-10241.json modified: 2019/10xxx/CVE-2019-10246.json modified: 2019/10xxx/CVE-2019-10247.json modified: 2019/10xxx/CVE-2019-10744.json modified: 2019/11xxx/CVE-2019-11048.json modified: 2019/11xxx/CVE-2019-11358.json modified: 2019/11xxx/CVE-2019-11477.json modified: 2019/11xxx/CVE-2019-11478.json modified: 2019/11xxx/CVE-2019-11479.json modified: 2019/11xxx/CVE-2019-11834.json modified: 2019/11xxx/CVE-2019-11835.json modified: 2019/11xxx/CVE-2019-11922.json modified: 2019/12xxx/CVE-2019-12086.json modified: 2019/12xxx/CVE-2019-12260.json modified: 2019/12xxx/CVE-2019-12261.json modified: 2019/12xxx/CVE-2019-12384.json modified: 2019/12xxx/CVE-2019-12402.json modified: 2019/12xxx/CVE-2019-12415.json modified: 2019/12xxx/CVE-2019-12419.json modified: 2019/12xxx/CVE-2019-12423.json modified: 2019/12xxx/CVE-2019-12814.json modified: 2019/12xxx/CVE-2019-12900.json modified: 2019/13xxx/CVE-2019-13990.json modified: 2019/14xxx/CVE-2019-14379.json modified: 2019/14xxx/CVE-2019-14540.json modified: 2019/14xxx/CVE-2019-14893.json modified: 2019/15xxx/CVE-2019-15903.json modified: 2019/16xxx/CVE-2019-16335.json modified: 2019/16xxx/CVE-2019-16942.json modified: 2019/16xxx/CVE-2019-16943.json modified: 2019/17xxx/CVE-2019-17091.json modified: 2019/17xxx/CVE-2019-17267.json modified: 2019/17xxx/CVE-2019-17359.json modified: 2019/17xxx/CVE-2019-17495.json modified: 2019/17xxx/CVE-2019-17531.json modified: 2019/17xxx/CVE-2019-17543.json modified: 2019/17xxx/CVE-2019-17558.json modified: 2019/17xxx/CVE-2019-17569.json modified: 2019/17xxx/CVE-2019-17632.json modified: 2019/17xxx/CVE-2019-17638.json modified: 2019/18xxx/CVE-2019-18348.json modified: 2019/1xxx/CVE-2019-1547.json modified: 2019/1xxx/CVE-2019-1549.json modified: 2019/1xxx/CVE-2019-1552.json modified: 2019/1xxx/CVE-2019-1563.json modified: 2019/20xxx/CVE-2019-20330.json modified: 2019/3xxx/CVE-2019-3738.json modified: 2019/3xxx/CVE-2019-3739.json modified: 2019/3xxx/CVE-2019-3740.json modified: 2019/5xxx/CVE-2019-5427.json modified: 2019/5xxx/CVE-2019-5435.json modified: 2019/5xxx/CVE-2019-5436.json modified: 2019/5xxx/CVE-2019-5443.json modified: 2019/5xxx/CVE-2019-5481.json modified: 2019/5xxx/CVE-2019-5482.json modified: 2019/9xxx/CVE-2019-9511.json modified: 2019/9xxx/CVE-2019-9513.json modified: 2020/10xxx/CVE-2020-10108.json modified: 2020/10xxx/CVE-2020-10543.json modified: 2020/10xxx/CVE-2020-10672.json modified: 2020/10xxx/CVE-2020-10673.json modified: 2020/10xxx/CVE-2020-10683.json modified: 2020/10xxx/CVE-2020-10722.json modified: 2020/10xxx/CVE-2020-10723.json modified: 2020/10xxx/CVE-2020-10724.json modified: 2020/10xxx/CVE-2020-10878.json modified: 2020/10xxx/CVE-2020-10968.json modified: 2020/10xxx/CVE-2020-10969.json modified: 2020/11xxx/CVE-2020-11022.json modified: 2020/11xxx/CVE-2020-11023.json modified: 2020/11xxx/CVE-2020-11080.json modified: 2020/11xxx/CVE-2020-11111.json modified: 2020/11xxx/CVE-2020-11112.json modified: 2020/11xxx/CVE-2020-11113.json modified: 2020/11xxx/CVE-2020-11619.json modified: 2020/11xxx/CVE-2020-11620.json modified: 2020/11xxx/CVE-2020-11655.json modified: 2020/11xxx/CVE-2020-11656.json modified: 2020/11xxx/CVE-2020-11971.json modified: 2020/11xxx/CVE-2020-11972.json modified: 2020/11xxx/CVE-2020-11973.json modified: 2020/11xxx/CVE-2020-11984.json modified: 2020/11xxx/CVE-2020-11993.json modified: 2020/11xxx/CVE-2020-11996.json modified: 2020/12xxx/CVE-2020-12243.json modified: 2020/12xxx/CVE-2020-12723.json modified: 2020/13xxx/CVE-2020-13630.json modified: 2020/13xxx/CVE-2020-13631.json modified: 2020/13xxx/CVE-2020-13632.json modified: 2020/13xxx/CVE-2020-13920.json modified: 2020/13xxx/CVE-2020-13934.json modified: 2020/13xxx/CVE-2020-13935.json modified: 2020/14xxx/CVE-2020-14060.json modified: 2020/14xxx/CVE-2020-14061.json modified: 2020/14xxx/CVE-2020-14062.json modified: 2020/14xxx/CVE-2020-14195.json modified: 2020/15xxx/CVE-2020-15358.json modified: 2020/15xxx/CVE-2020-15389.json modified: 2020/1xxx/CVE-2020-1730.json modified: 2020/1xxx/CVE-2020-1935.json modified: 2020/1xxx/CVE-2020-1938.json modified: 2020/1xxx/CVE-2020-1941.json modified: 2020/1xxx/CVE-2020-1945.json modified: 2020/1xxx/CVE-2020-1950.json modified: 2020/1xxx/CVE-2020-1951.json modified: 2020/1xxx/CVE-2020-1953.json modified: 2020/1xxx/CVE-2020-1954.json modified: 2020/1xxx/CVE-2020-1967.json modified: 2020/3xxx/CVE-2020-3235.json modified: 2020/3xxx/CVE-2020-3909.json modified: 2020/4xxx/CVE-2020-4051.json modified: 2020/5xxx/CVE-2020-5397.json modified: 2020/5xxx/CVE-2020-5398.json modified: 2020/5xxx/CVE-2020-5407.json modified: 2020/5xxx/CVE-2020-5408.json modified: 2020/7xxx/CVE-2020-7067.json modified: 2020/8xxx/CVE-2020-8172.json modified: 2020/8xxx/CVE-2020-8174.json modified: 2020/8xxx/CVE-2020-8840.json modified: 2020/9xxx/CVE-2020-9281.json modified: 2020/9xxx/CVE-2020-9327.json modified: 2020/9xxx/CVE-2020-9409.json modified: 2020/9xxx/CVE-2020-9410.json modified: 2020/9xxx/CVE-2020-9484.json modified: 2020/9xxx/CVE-2020-9488.json modified: 2020/9xxx/CVE-2020-9489.json modified: 2020/9xxx/CVE-2020-9490.json modified: 2020/9xxx/CVE-2020-9546.json modified: 2020/9xxx/CVE-2020-9547.json modified: 2020/9xxx/CVE-2020-9548.json
2020-10-20 12:39:21 -07:00
},
{
2020-10-20 22:01:54 +00:00
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
2020-11-27 15:01:38 +00:00
},
{
"refsource": "MLIST",
"name": "[tomee-commits] 20201127 [jira] [Resolved] (TOMEE-2789) TomEE plus(7.0.7) is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.",
"url": "https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97@%3Ccommits.tomee.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[tomee-commits] 20201127 [jira] [Updated] (TOMEE-2789) TomEE plus(7.0.7) is affected by CVE-2020-1938(BDSA-2020-0339) vulnerability.",
"url": "https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda@%3Ccommits.tomee.apache.org%3E"
ill Situ <Bill.Situ@Oracle.com> On branch cna/Oracle/CPU2021Jan3rd Changes to be committed: modified: 2012/2xxx/CVE-2012-2098.json modified: 2015/4xxx/CVE-2015-4000.json modified: 2015/8xxx/CVE-2015-8965.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/5xxx/CVE-2016-5725.json modified: 2017/12xxx/CVE-2017-12626.json modified: 2017/5xxx/CVE-2017-5611.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/8xxx/CVE-2017-8028.json modified: 2018/0xxx/CVE-2018-0732.json modified: 2018/10xxx/CVE-2018-10237.json modified: 2018/11xxx/CVE-2018-11775.json modified: 2018/15xxx/CVE-2018-15756.json modified: 2018/1xxx/CVE-2018-1258.json modified: 2018/1xxx/CVE-2018-1285.json modified: 2018/20xxx/CVE-2018-20781.json modified: 2018/7xxx/CVE-2018-7318.json modified: 2018/8xxx/CVE-2018-8032.json modified: 2018/9xxx/CVE-2018-9019.json modified: 2019/0xxx/CVE-2019-0188.json modified: 2019/0xxx/CVE-2019-0227.json modified: 2019/0xxx/CVE-2019-0230.json modified: 2019/0xxx/CVE-2019-0233.json modified: 2019/10xxx/CVE-2019-10086.json modified: 2019/10xxx/CVE-2019-10173.json modified: 2019/10xxx/CVE-2019-10246.json modified: 2019/10xxx/CVE-2019-10247.json modified: 2019/10xxx/CVE-2019-10744.json modified: 2019/11xxx/CVE-2019-11135.json modified: 2019/11xxx/CVE-2019-11269.json modified: 2019/11xxx/CVE-2019-11358.json modified: 2019/12xxx/CVE-2019-12399.json modified: 2019/12xxx/CVE-2019-12402.json modified: 2019/12xxx/CVE-2019-12415.json modified: 2019/13xxx/CVE-2019-13990.json modified: 2019/14xxx/CVE-2019-14862.json modified: 2019/17xxx/CVE-2019-17091.json modified: 2019/17xxx/CVE-2019-17195.json modified: 2019/17xxx/CVE-2019-17359.json modified: 2019/17xxx/CVE-2019-17563.json modified: 2019/17xxx/CVE-2019-17566.json modified: 2019/17xxx/CVE-2019-17569.json modified: 2019/1xxx/CVE-2019-1551.json modified: 2019/1xxx/CVE-2019-1559.json modified: 2019/20xxx/CVE-2019-20892.json modified: 2019/20xxx/CVE-2019-20907.json modified: 2019/3xxx/CVE-2019-3773.json modified: 2019/3xxx/CVE-2019-3778.json modified: 2019/5xxx/CVE-2019-5427.json modified: 2019/7xxx/CVE-2019-7164.json modified: 2019/7xxx/CVE-2019-7548.json modified: 2019/9xxx/CVE-2019-9511.json modified: 2019/9xxx/CVE-2019-9513.json modified: 2020/10xxx/CVE-2020-10531.json modified: 2020/10xxx/CVE-2020-10543.json modified: 2020/10xxx/CVE-2020-10672.json modified: 2020/10xxx/CVE-2020-10673.json modified: 2020/10xxx/CVE-2020-10683.json modified: 2020/10xxx/CVE-2020-10722.json modified: 2020/10xxx/CVE-2020-10723.json modified: 2020/10xxx/CVE-2020-10724.json modified: 2020/10xxx/CVE-2020-10725.json modified: 2020/10xxx/CVE-2020-10726.json modified: 2020/10xxx/CVE-2020-10878.json modified: 2020/10xxx/CVE-2020-10968.json modified: 2020/10xxx/CVE-2020-10969.json modified: 2020/11xxx/CVE-2020-11022.json modified: 2020/11xxx/CVE-2020-11023.json modified: 2020/11xxx/CVE-2020-11080.json modified: 2020/11xxx/CVE-2020-11111.json modified: 2020/11xxx/CVE-2020-11112.json modified: 2020/11xxx/CVE-2020-11113.json modified: 2020/11xxx/CVE-2020-11612.json modified: 2020/11xxx/CVE-2020-11619.json modified: 2020/11xxx/CVE-2020-11620.json modified: 2020/11xxx/CVE-2020-11655.json modified: 2020/11xxx/CVE-2020-11656.json modified: 2020/11xxx/CVE-2020-11971.json modified: 2020/11xxx/CVE-2020-11972.json modified: 2020/11xxx/CVE-2020-11973.json modified: 2020/11xxx/CVE-2020-11979.json modified: 2020/11xxx/CVE-2020-11984.json modified: 2020/11xxx/CVE-2020-11985.json modified: 2020/11xxx/CVE-2020-11993.json modified: 2020/11xxx/CVE-2020-11994.json modified: 2020/11xxx/CVE-2020-11996.json modified: 2020/11xxx/CVE-2020-11998.json modified: 2020/12xxx/CVE-2020-12723.json modified: 2020/13xxx/CVE-2020-13254.json modified: 2020/13xxx/CVE-2020-13596.json modified: 2020/13xxx/CVE-2020-13871.json modified: 2020/13xxx/CVE-2020-13934.json modified: 2020/13xxx/CVE-2020-13935.json modified: 2020/13xxx/CVE-2020-13954.json modified: 2020/14xxx/CVE-2020-14060.json modified: 2020/14xxx/CVE-2020-14061.json modified: 2020/14xxx/CVE-2020-14062.json modified: 2020/14xxx/CVE-2020-14147.json modified: 2020/14xxx/CVE-2020-14195.json modified: 2020/14xxx/CVE-2020-14422.json modified: 2020/15xxx/CVE-2020-15025.json modified: 2020/15xxx/CVE-2020-15358.json modified: 2020/17xxx/CVE-2020-17498.json modified: 2020/17xxx/CVE-2020-17521.json modified: 2020/17xxx/CVE-2020-17530.json modified: 2020/1xxx/CVE-2020-1935.json modified: 2020/1xxx/CVE-2020-1938.json modified: 2020/1xxx/CVE-2020-1945.json modified: 2020/1xxx/CVE-2020-1967.json modified: 2020/1xxx/CVE-2020-1968.json modified: 2020/1xxx/CVE-2020-1971.json modified: 2020/24xxx/CVE-2020-24583.json modified: 2020/24xxx/CVE-2020-24584.json modified: 2020/24xxx/CVE-2020-24616.json modified: 2020/24xxx/CVE-2020-24750.json modified: 2020/25xxx/CVE-2020-25020.json modified: 2020/25xxx/CVE-2020-25862.json modified: 2020/25xxx/CVE-2020-25863.json modified: 2020/25xxx/CVE-2020-25866.json modified: 2020/26xxx/CVE-2020-26575.json modified: 2020/27xxx/CVE-2020-27216.json modified: 2020/35xxx/CVE-2020-35460.json modified: 2020/5xxx/CVE-2020-5398.json modified: 2020/5xxx/CVE-2020-5407.json modified: 2020/5xxx/CVE-2020-5408.json modified: 2020/5xxx/CVE-2020-5421.json modified: 2020/7xxx/CVE-2020-7064.json modified: 2020/8xxx/CVE-2020-8172.json modified: 2020/8xxx/CVE-2020-8174.json modified: 2020/8xxx/CVE-2020-8265.json modified: 2020/8xxx/CVE-2020-8277.json modified: 2020/8xxx/CVE-2020-8287.json modified: 2020/9xxx/CVE-2020-9281.json modified: 2020/9xxx/CVE-2020-9327.json modified: 2020/9xxx/CVE-2020-9484.json modified: 2020/9xxx/CVE-2020-9488.json modified: 2020/9xxx/CVE-2020-9490.json modified: 2020/9xxx/CVE-2020-9546.json modified: 2020/9xxx/CVE-2020-9547.json modified: 2020/9xxx/CVE-2020-9548.json
2021-01-19 13:08:08 -08:00
},
{
2021-01-20 15:02:47 +00:00
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
2021-01-26 18:05:08 +00:00
},
{
"refsource": "MLIST",
"name": "[announce] 20210125 Apache Software Foundation Security Report: 2020",
"url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E"
2021-02-24 04:00:39 +00:00
},
{
"refsource": "MLIST",
"name": "[announce] 20210223 Re: Apache Software Foundation Security Report: 2020",
"url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E"
2020-02-24 22:01:04 +00:00
}
]
2019-12-02 23:01:00 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-02-24 22:01:04 +00:00
"value": "When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations."
2019-12-02 23:01:00 +00:00
}
]
}
}