Apache Tomcat 代码问题漏洞
CNNVD-ID编号 | CNNVD-202005-1078 | CVE编号 | CVE-2020-9484 |
发布时间 | 2020-05-20 | 更新时间 | 2021-01-20 |
漏洞类型 | 代码问题 | 漏洞来源 | N/A |
危险等级 | 高危 | 威胁类型 | 本地 |
厂商 | N/A |
漏洞介绍
Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。
Apache Tomcat中存在代码问题漏洞。攻击者可通过控制服务器上文件的内容和名称等方法利用该漏洞执行代码。以下产品及版本受到影响:Apache Tomcat 10.0.0-M1版本至10.0.0-M4版本,9.0.0.0.M1版本至9.0.34版本,8.5.0版本至8.5.54版本,7.0.0版本至7.0.103版本。
漏洞补丁
目前厂商已发布升级了Apache Tomcat 代码问题漏洞的补丁,Apache Tomcat 代码问题漏洞的补丁获取链接:
https://tomcat.apache.org/security.html
参考网址
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4727
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html
来源:MISC
链接:https://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html
来源:MISC
来源:MLIST
来源:CONFIRM
链接:https://kc.mcafee.com/corporate/index?page=content&id=SB10332
来源:FEDORA
来源:UBUNTU
链接:https://usn.ubuntu.com/4596-1/
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuoct2020.html
来源:UBUNTU
链接:https://usn.ubuntu.com/4448-1/
来源:FEDORA
来源:MLIST
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2020/Jun/6
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20200528-0005/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html
来源:MLIST
来源:GENTOO
链接:https://security.gentoo.org/glsa/202006-21
来源:MLIST
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/05/msg00020.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MISC
链接:https://www.oracle.com/security-alerts/cpujul2020.html
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujul2020.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3547/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-9484
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3628/
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/46749
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2089/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2110/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2362/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158050/Red-Hat-Security-Advisory-2020-2529-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2554/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2447/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1837/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Apache-Tomcat-code-execution-via-PersistenceManager-32313
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1887/
来源:www.ibm.com
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2020-9484
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1793/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158621/Red-Hat-Security-Advisory-2020-3017-01.html
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujan2021.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2046/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2670/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158103/Gentoo-Linux-Security-Advisory-202006-21.html
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpuoct2020.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158761/Ubuntu-Security-Notice-USN-4448-1.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159666/Ubuntu-Security-Notice-USN-4596-1.html
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202005-1078

评论