Detecting high-risk vulnerabilities potentially affecting 1 million servers worldwide
Ghostcat is a flaw in the AJP Tomcat (Apache JServ Protocol) AJP Tomcat protocol - a free, open source web server software used to run web applications programmed in the java language.
Although it is free software, Apache Tomcat is highly appreciated for its ability to set up a secure, cost-effective, and efficient website environment. That is why Apache TomCat is always on the list of the most popular open source software in the world today and is widely used by many units in the fields of finance, banking, and telecommunications. . Therefore, the appearance of vulnerabilities on this software is considered extremely dangerous.
The GhostCat vulnerability was tracked with code CVE-2020-1938 (CVSS 9.8), exploited by hackers in the form of special characters while sending requests to the server to read source code or configuration file information. server. Once these configuration files are acquired, hackers can gain access and install backdoors to gain remote control and execute other network attacks.

Severity.
According to VSEC experts, the Ghostcat flaw has now been detected on all versions (9.x / 8.x / 7.x / 6.x) of Apache Tomcat released over the past 13 years, and the It is especially serious that exploit codes have appeared and been shared widely on the internet, from which hackers can find and deploy methods of hacking into web servers easily. T
In the BinaryEdge vulnerability search engine, there are currently more than one million Tomcat servers currently in operation, so VSEC experts emphasize that all businesses and individuals use apache tomcat without updating to the session. The latest version is all on the list of possible attackers' prey. Therefore, VSEC recommends that if businesses use the Apache Tomcat system, please update the system to the latest version, never open the AJP port to untrusted clients.
Tomcat team said: 'Users should note that a change has been made in the default AJP Connector configuration version 9.0.31. Therefore users who update to version 9.0.31 or higher will need to make minor changes to their configuration. ' However, if for some reason the user is unable to upgrade the affected server immediately, it can be fixed temporarily by turning off the AJP Connector, or redirecting it to a local port to avoid unnecessary risks to the server.
You should read it
- Hundreds of thousands of IoT devices are likely to be attacked by vulnerabilities on the server
- Critical error on Apache Struts2 allows hackers to take over the web server
- Detects many security vulnerabilities in Lenovo server infrastructure
- MySQL vulnerabilities allow malicious servers to steal data from customers
- The Mail app on iOS has serious vulnerabilities
- Immediately patch CWP vulnerability that allows code execution as root on Linux servers
- The difference between web server and app server
- Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
May be interested
- MySQL vulnerabilities allow malicious servers to steal data from customerssomeone can take advantage of this problem to steal sensitive data from an improperly configured web server, allowing connection to untrusted servers or from database management applications. .
- Detecting zero-day vulnerabilities in Internet Explorer helps hackers gain control of the computerthe research team from qihoo 360's security unit discovered a zero-day vulnerability (the term refers to unpublished or unresolved vulnerabilities) on internet explorer.
- The Internet is experiencing a huge problem with C / C ++, causing developers to 'sweat'an error affects the iphone, another error affecting windows and the third bug affects servers running linux - the total attack of a certain 'dark army'?
- Reveal personal data of more than 1.3 million people from a vulnerability in web applicationgeorgia tech (georgia institute of technology) - one of the largest us education institutions, has announced the discovery of a serious data breach targeting its system, affecting nearly 1.3 million people.
- HP publishes a series of critical vulnerabilities in the Teradici PCoIP protocolhp has warned of serious security vulnerabilities in the teradici pcoip client and agent for windows, linux, and macos. these vulnerabilities affect 15 million endpoints.
- 950 million users should update the Telegram app immediatelycybersecurity firm eset has found a zero day vulnerability in the telegram app for android that allowed attackers to send malicious files disguised as videos, affecting millions of users.
- Detecting vulnerabilities in BitTorrent applications allows hackers to control user computersa serious flaw in the bittorrent application of transmission was discovered by tavis ormandy, a leading security expert at google. if successfully exploited, hackers can take full control of computers running linux or windows.
- How to protect high-risk network ports?data packets transmitted to and from numbered network ports are associated with specific ip addresses and endpoints, using either tcp or udp protocols. all network ports are at risk of attack, the following article will provide specific information about network port risks.
- Many major vulnerabilities found in Kaspersky Antivirus for Linux servers, download the patch hereleandro barragan and maximiliano vidal, two researchers from network security company core security, have found a number of vulnerabilities that can be exploited in the web management console of kaspersky anti-virus for linux servers.
- Warning: 5 million Samsung, OPPO, Vivo smartphones ... are infected with malware and this is how to check and removea large-scale malware distribution campaign has just been discovered and it is affecting nearly 5 million smartphones of major brands worldwide including honor, huawei, xiaomi, oppo, vivo, samsung and gionee.