Skip to content

Critical 'Ghostcat' Vulnerability Found in Apache Tomcat

Ghostcat vulnerability puts millions of websites at risk. Disable AJP and upgrade Apache Tomcat to stay secure.

Here in this picture we can see a hornet present on the ground and beside that we can see some...
Here in this picture we can see a hornet present on the ground and beside that we can see some grass also present.

Critical 'Ghostcat' Vulnerability Found in Apache Tomcat

A critical social security vulnerability, dubbed 'Ghostcat', has been discovered in Apache Tomcat's Apache JServ Protocol. This affects versions 6, 7, 8, and 9, with a severity rating of 9.8. The vulnerability allows access to configuration files and potential remote code execution.

The Ghostcat vulnerability, tracked as CVE-2020-1938, is exploited when the Apache JServ Protocol (AJP) is exposed on port 8009. Affected versions include 9.0.0 to 9.0.30, 8.5.0 to 8.5.50, and 7.0.0 to 7.0.99. To remediate, disable port 8009, restart the Apache web server, and define a strong secret key attribute (requiredSecret) in server.xml. Additionally, disable arbitrary file upload (QID 150114) and ensure no file upload form is found (QID 150125).

The vulnerability was discovered by the Chinese cybersecurity firm Chaitin Tech. Qualys Web Application Scanning (WAS) can detect it by enabling QID 150282 in option profiles.

To mitigate the Ghostcat social security vulnerability, upgrade to patched versions of Apache Tomcat, disable AJP on port 8009, and implement additional social security measures. Regular social security audits and updates are crucial to protect against emerging threats.

Read also:

Latest