Detecting high-risk vulnerabilities potentially affecting 1 million servers worldwide
The vulnerability allows an attacker to read configuration files of the application, steal passwords or API tokens, and even hijack the server.
Ghostcat is a flaw in the AJP Tomcat (Apache JServ Protocol) AJP Tomcat protocol - a free, open source web server software used to run web applications programmed in the java language.
Although it is free software, Apache Tomcat is highly appreciated for its ability to set up a secure, cost-effective, and efficient website environment. That is why Apache TomCat is always on the list of the most popular open source software in the world today and is widely used by many units in the fields of finance, banking, and telecommunications. . Therefore, the appearance of vulnerabilities on this software is considered extremely dangerous.
The GhostCat vulnerability was tracked with code CVE-2020-1938 (CVSS 9.8), exploited by hackers in the form of special characters while sending requests to the server to read source code or configuration file information. server. Once these configuration files are acquired, hackers can gain access and install backdoors to gain remote control and execute other network attacks.
Severity.
According to VSEC experts, the Ghostcat flaw has now been detected on all versions (9.x / 8.x / 7.x / 6.x) of Apache Tomcat released over the past 13 years, and the It is especially serious that exploit codes have appeared and been shared widely on the internet, from which hackers can find and deploy methods of hacking into web servers easily. T
In the BinaryEdge vulnerability search engine, there are currently more than one million Tomcat servers currently in operation, so VSEC experts emphasize that all businesses and individuals use apache tomcat without updating to the session. The latest version is all on the list of possible attackers' prey. Therefore, VSEC recommends that if businesses use the Apache Tomcat system, please update the system to the latest version, never open the AJP port to untrusted clients.
Tomcat team said: 'Users should note that a change has been made in the default AJP Connector configuration version 9.0.31. Therefore users who update to version 9.0.31 or higher will need to make minor changes to their configuration. ' However, if for some reason the user is unable to upgrade the affected server immediately, it can be fixed temporarily by turning off the AJP Connector, or redirecting it to a local port to avoid unnecessary risks to the server.
You should read it
- Release software to check DNS server vulnerabilities
- Warning about serious vulnerabilities in SQL Server
- Hundreds of thousands of IoT devices are likely to be attacked by vulnerabilities on the server
- Critical error on Apache Struts2 allows hackers to take over the web server
- Detects many security vulnerabilities in Lenovo server infrastructure
- MySQL vulnerabilities allow malicious servers to steal data from customers
- The Mail app on iOS has serious vulnerabilities
- Immediately patch CWP vulnerability that allows code execution as root on Linux servers
- The difference between web server and app server
- Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
- Network basics: Part 3 - DNS Server
- More than 70,000 Memcached servers are still capable of being hacked remotely
Maybe you are interested
How to Block Ads on Google Chrome Why the foundation of the world's tallest tower Burj Khalifa must be powered 24/7 Instructions to turn off the Spotify Canvas feature How to configure static IP address on Ubuntu 22.04 LTS and 22.10 5 things to do after upgrading to Ubuntu 22.04 LTS How to install Ubuntu 22.04 LTS on PC or laptop