Uploaded image for project: 'Undertow'
  1. Undertow
  2. UNDERTOW-1667

CVE-2020-1745 - AJP File Read/Inclusion Vulnerability

XMLWordPrintable

    Security Tracking Issue

    Do not make this issue public.

    Impact: Important
    Public Date: 26-Feb-2020
    Resolve Bug By: 18-Mar-2020

    In case the dates above are already past, please evaluate this bug in your next prioritization review and make a decision then.

    Please see the Security Errata Policy for further details: https://docs.engineering.redhat.com/x/9RBqB

    Flaw:


    CVE-2020-1745 undertow: AJP File Read/Inclusion Vulnerability
    https://bugzilla.redhat.com/show_bug.cgi?id=1807305

    A file read/inclusion vulnerability was found in AJP connector in Undertow. This is enabled with a default AJP configuration port of 8009. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution (RCE).

            ropalka Richard Opalka
            rhn-support-mmiura Masafumi Miura
            Alessio Soldano, Anne-Louise Tangring (Inactive), Anton Boyko (Inactive), Bartosz Baranowski, Bartosz Spyrko-Smietanko (Inactive), Brad Maxwell, Brian Stansberry, Carlo de Wolf, Chess Hazlett, Daniel Kreling, Darran Lofthouse, Ingo Weiss, James Perkins, Jimmy Wilson, Jonathan Christison, Ken Wills, Kunjan Rathod (Inactive), Lin Gao, Martin Svehla, Masafumi Miura, Miroslav Sochurek, Neil Wallace, Panagiotis Sotiropoulos (Inactive), Paramvir Jindal, Peter Mackay, Richard Opalka, Roberto Oliveira, Rostislav Svoboda, Stefano Maestri, Stuart Douglas (Inactive), Ted Won, Tom Jenkinson, Tristan Tarrant, Vladimir Dosoudil
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

              Created:
              Updated:
              Resolved: