CVE-2020-9484

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
apacheCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
apachetomcat
7.0.0 ≤
𝑥
< 7.0.108
apachetomcat
8.5.0 ≤
𝑥
< 8.5.63
apachetomcat
9.0.1 ≤
𝑥
< 9.0.43
apachetomcat
9.0.0:milestone1
apachetomcat
9.0.0:milestone10
apachetomcat
9.0.0:milestone11
apachetomcat
9.0.0:milestone12
apachetomcat
9.0.0:milestone13
apachetomcat
9.0.0:milestone14
apachetomcat
9.0.0:milestone15
apachetomcat
9.0.0:milestone16
apachetomcat
9.0.0:milestone17
apachetomcat
9.0.0:milestone18
apachetomcat
9.0.0:milestone19
apachetomcat
9.0.0:milestone2
apachetomcat
9.0.0:milestone20
apachetomcat
9.0.0:milestone21
apachetomcat
9.0.0:milestone22
apachetomcat
9.0.0:milestone23
apachetomcat
9.0.0:milestone24
apachetomcat
9.0.0:milestone25
apachetomcat
9.0.0:milestone26
apachetomcat
9.0.0:milestone27
apachetomcat
9.0.0:milestone3
apachetomcat
9.0.0:milestone4
apachetomcat
9.0.0:milestone5
apachetomcat
9.0.0:milestone6
apachetomcat
9.0.0:milestone7
apachetomcat
9.0.0:milestone8
apachetomcat
9.0.0:milestone9
apachetomcat
10.0.0:milestone1
apachetomcat
10.0.0:milestone2
apachetomcat
10.0.0:milestone3
apachetomcat
10.0.0:milestone4
debiandebian_linux
8.0
debiandebian_linux
9.0
debiandebian_linux
10.0
opensuseleap
15.1
canonicalubuntu_linux
16.04
canonicalubuntu_linux
20.04
oracleagile_engineering_data_management
6.2.1.0
oracleagile_plm
9.3.3
oracleagile_plm
9.3.5
oracleagile_plm
9.3.6
oraclecommunications_cloud_native_core_binding_support_function
1.10.0
oraclecommunications_cloud_native_core_policy
1.14.0
oraclecommunications_diameter_signaling_router
8.0.0.0 ≤
𝑥
≤ 8.4.0.5
oraclecommunications_element_manager
8.2.0 ≤
𝑥
≤ 8.2.2
oraclecommunications_instant_messaging_server
10.0.1.4.0
oraclecommunications_session_report_manager
8.2.0 ≤
𝑥
≤ 8.2.2
oraclecommunications_session_route_manager
8.2.0 ≤
𝑥
≤ 8.2.2
oracledatabase
12.2.0.1
oraclefmw_platform
12.2.1.3.0
oraclefmw_platform
12.2.1.4.0
oraclehospitality_guest_access
4.2.0
oraclehospitality_guest_access
4.2.1
oracleinstantis_enterprisetrack
17.1 ≤
𝑥
≤ 17.3
oraclemanaged_file_transfer
12.2.1.3.0
oraclemanaged_file_transfer
12.2.1.4.0
oraclemysql_enterprise_monitor
𝑥
≤ 8.0.21
oracleretail_order_broker
15.0
oraclesiebel_apps_-_marketing
𝑥
≤ 21.9
oraclesiebel_ui_framework
𝑥
≤ 20.12
oracletransportation_management
6.3.7
oracleworkload_manager
12.2.0.1
mcafeeepolicy_orchestrator
5.9.0
mcafeeepolicy_orchestrator
5.9.1
mcafeeepolicy_orchestrator
5.10.0
mcafeeepolicy_orchestrator
5.10.0:update_1
mcafeeepolicy_orchestrator
5.10.0:update_2
mcafeeepolicy_orchestrator
5.10.0:update_3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tomcat9
bullseye (security)
9.0.43-2~deb11u10
fixed
bullseye
9.0.43-2~deb11u10
fixed
stretch
ignored
bookworm
9.0.70-2
fixed
sid
9.0.95-1
fixed
trixie
9.0.95-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tomcat7
noble
dne
mantic
dne
lunar
dne
kinetic
dne
jammy
dne
impish
dne
hirsute
dne
groovy
dne
focal
dne
eoan
dne
bionic
Fixed 7.0.78-1ubuntu0.1~esm1
released
xenial
Fixed 7.0.68-1ubuntu0.4+esm2
released
trusty
Fixed 7.0.52-1ubuntu0.16+esm1
released
tomcat8
noble
dne
mantic
dne
lunar
dne
kinetic
dne
jammy
dne
impish
dne
hirsute
dne
groovy
dne
focal
dne
eoan
dne
bionic
Fixed 8.5.39-1ubuntu1~18.04.3+esm2
released
xenial
Fixed 8.0.32-1ubuntu1.13
released
trusty
dne
tomcat9
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
Fixed 9.0.31-1ubuntu0.1
released
eoan
ignored
bionic
Fixed 9.0.16-3ubuntu0.18.04.2
released
xenial
dne
trusty
dne
References