7

CVE-2020-9484

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ApacheTomcat Version >= 7.0.0 < 7.0.108
ApacheTomcat Version >= 8.5.0 < 8.5.63
ApacheTomcat Version >= 9.0.1 < 9.0.43
ApacheTomcat Version9.0.0 Updatemilestone1
ApacheTomcat Version9.0.0 Updatemilestone10
ApacheTomcat Version9.0.0 Updatemilestone11
ApacheTomcat Version9.0.0 Updatemilestone12
ApacheTomcat Version9.0.0 Updatemilestone13
ApacheTomcat Version9.0.0 Updatemilestone14
ApacheTomcat Version9.0.0 Updatemilestone15
ApacheTomcat Version9.0.0 Updatemilestone16
ApacheTomcat Version9.0.0 Updatemilestone17
ApacheTomcat Version9.0.0 Updatemilestone18
ApacheTomcat Version9.0.0 Updatemilestone19
ApacheTomcat Version9.0.0 Updatemilestone2
ApacheTomcat Version9.0.0 Updatemilestone20
ApacheTomcat Version9.0.0 Updatemilestone21
ApacheTomcat Version9.0.0 Updatemilestone22
ApacheTomcat Version9.0.0 Updatemilestone23
ApacheTomcat Version9.0.0 Updatemilestone24
ApacheTomcat Version9.0.0 Updatemilestone25
ApacheTomcat Version9.0.0 Updatemilestone26
ApacheTomcat Version9.0.0 Updatemilestone27
ApacheTomcat Version9.0.0 Updatemilestone3
ApacheTomcat Version9.0.0 Updatemilestone4
ApacheTomcat Version9.0.0 Updatemilestone5
ApacheTomcat Version9.0.0 Updatemilestone6
ApacheTomcat Version9.0.0 Updatemilestone7
ApacheTomcat Version9.0.0 Updatemilestone8
ApacheTomcat Version9.0.0 Updatemilestone9
ApacheTomcat Version10.0.0 Updatemilestone1
ApacheTomcat Version10.0.0 Updatemilestone2
ApacheTomcat Version10.0.0 Updatemilestone3
ApacheTomcat Version10.0.0 Updatemilestone4
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
OpensuseLeap Version15.1
FedoraprojectFedora Version31
FedoraprojectFedora Version32
CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalUbuntu Linux Version20.04 SwEditionlts
OracleAgile Plm Version9.3.3
OracleAgile Plm Version9.3.5
OracleAgile Plm Version9.3.6
OracleCommunications Diameter Signaling Router Version >= 8.0.0.0 <= 8.4.0.5
OracleCommunications Element Manager Version >= 8.2.0 <= 8.2.2
OracleCommunications Session Report Manager Version >= 8.2.0 <= 8.2.2
OracleCommunications Session Route Manager Version >= 8.2.0 <= 8.2.2
OracleDatabase Version12.2.0.1 SwEditionenterprise
OracleDatabase Version19c SwEditionenterprise
OracleDatabase Version21c SwEditionenterprise
OracleFmw Platform Version12.2.1.3.0
OracleFmw Platform Version12.2.1.4.0
OracleHospitality Guest Access Version4.2.0
OracleHospitality Guest Access Version4.2.1
OracleInstantis Enterprisetrack Version >= 17.1 <= 17.3
OracleManaged File Transfer Version12.2.1.3.0
OracleManaged File Transfer Version12.2.1.4.0
OracleMysql Enterprise Monitor Version <= 8.0.21
OracleRetail Order Broker Version15.0
OracleSiebel Apps - Marketing Version <= 21.9
OracleSiebel Ui Framework Version <= 20.12
OracleWorkload Manager Version12.2.0.1
OracleWorkload Manager Version18c
OracleWorkload Manager Version19c
McafeeEpolicy Orchestrator Version5.9.0
McafeeEpolicy Orchestrator Version5.9.1
McafeeEpolicy Orchestrator Version5.10.0 Update-
McafeeEpolicy Orchestrator Version5.10.0 Updateupdate_1
McafeeEpolicy Orchestrator Version5.10.0 Updateupdate_2
McafeeEpolicy Orchestrator Version5.10.0 Updateupdate_3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 93.33% 0.998
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7 1 5.9
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 4.4 3.4 6.4
AV:L/AC:M/Au:N/C:P/I:P/A:P
CWE-502 Deserialization of Untrusted Data

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.

https://usn.ubuntu.com/4448-1/
Third Party Advisory
http://seclists.org/fulldisclosure/2020/Jun/6
Third Party Advisory
Mailing List
https://usn.ubuntu.com/4596-1/
Third Party Advisory