CVE-2020-9484 Report - Details, Severity, & Advisories
Twingate Team
•
Jul 4, 2024
What is CVE-2020-9484?
CVE-2020-9484 is a high-severity vulnerability affecting Apache Tomcat, a widely used web server software. This vulnerability allows attackers to execute remote code by exploiting a Java deserialization issue when the PersistentManager is configured as a session manager. Systems running specific versions of Apache Tomcat and configured with a FileStore and a lax sessionAttributeValueClassNameFilter are at risk. Organizations must update their Apache Tomcat software to protect against this vulnerability.
Who is impacted by CVE-2020-9484?
CVE-2020-9484 affects users of Apache Tomcat with specific configurations. At risk are users of Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54, and 7.0.0 to 7.0.103. Users of openSUSE Leap 15.1 with Tomcat installed are also affected. The vulnerability is present when the PersistentManager is configured as a session manager and allows arbitrary file uploads to the server.
What to do if CVE-2020-9484 affected you
If you're affected by the CVE-2020-9484 vulnerability, it's important to take action to protect your system. To mitigate the risk, follow these steps:
Upgrade to an unaffected version of Apache Tomcat
Disable the FileStore function
Configure the value of sessionAttributeValueClassNameFilter to ensure that only objects with specific attributes can be serialized/deserialized
Remember to regularly update and patch your software, and follow security best practices for server configuration and management.
Is this in CISA’s Known Exploited Vulnerabilities Catalog?
The CVE-2020-9484 vulnerability, also known as Deserialization of Untrusted Data in Apache Tomcat, is not listed in CISA's Known Exploited Vulnerabilities Catalog. This high-severity vulnerability was published on May 20, 2020, and affects specific versions of Apache Tomcat.
Weakness Enumeration
The weakness enumeration for this vulnerability is categorized as CWE-502, which involves deserialization of untrusted data in Apache Tomcat.
Learn More
For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, visit the National Vulnerability Database page or refer to the sources below:
Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.
CVE-2020-9484 Report - Details, Severity, & Advisories
Twingate Team
•
Jul 4, 2024
What is CVE-2020-9484?
CVE-2020-9484 is a high-severity vulnerability affecting Apache Tomcat, a widely used web server software. This vulnerability allows attackers to execute remote code by exploiting a Java deserialization issue when the PersistentManager is configured as a session manager. Systems running specific versions of Apache Tomcat and configured with a FileStore and a lax sessionAttributeValueClassNameFilter are at risk. Organizations must update their Apache Tomcat software to protect against this vulnerability.
Who is impacted by CVE-2020-9484?
CVE-2020-9484 affects users of Apache Tomcat with specific configurations. At risk are users of Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54, and 7.0.0 to 7.0.103. Users of openSUSE Leap 15.1 with Tomcat installed are also affected. The vulnerability is present when the PersistentManager is configured as a session manager and allows arbitrary file uploads to the server.
What to do if CVE-2020-9484 affected you
If you're affected by the CVE-2020-9484 vulnerability, it's important to take action to protect your system. To mitigate the risk, follow these steps:
Upgrade to an unaffected version of Apache Tomcat
Disable the FileStore function
Configure the value of sessionAttributeValueClassNameFilter to ensure that only objects with specific attributes can be serialized/deserialized
Remember to regularly update and patch your software, and follow security best practices for server configuration and management.
Is this in CISA’s Known Exploited Vulnerabilities Catalog?
The CVE-2020-9484 vulnerability, also known as Deserialization of Untrusted Data in Apache Tomcat, is not listed in CISA's Known Exploited Vulnerabilities Catalog. This high-severity vulnerability was published on May 20, 2020, and affects specific versions of Apache Tomcat.
Weakness Enumeration
The weakness enumeration for this vulnerability is categorized as CWE-502, which involves deserialization of untrusted data in Apache Tomcat.
Learn More
For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, visit the National Vulnerability Database page or refer to the sources below:
Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.
CVE-2020-9484 Report - Details, Severity, & Advisories
Twingate Team
•
Jul 4, 2024
What is CVE-2020-9484?
CVE-2020-9484 is a high-severity vulnerability affecting Apache Tomcat, a widely used web server software. This vulnerability allows attackers to execute remote code by exploiting a Java deserialization issue when the PersistentManager is configured as a session manager. Systems running specific versions of Apache Tomcat and configured with a FileStore and a lax sessionAttributeValueClassNameFilter are at risk. Organizations must update their Apache Tomcat software to protect against this vulnerability.
Who is impacted by CVE-2020-9484?
CVE-2020-9484 affects users of Apache Tomcat with specific configurations. At risk are users of Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54, and 7.0.0 to 7.0.103. Users of openSUSE Leap 15.1 with Tomcat installed are also affected. The vulnerability is present when the PersistentManager is configured as a session manager and allows arbitrary file uploads to the server.
What to do if CVE-2020-9484 affected you
If you're affected by the CVE-2020-9484 vulnerability, it's important to take action to protect your system. To mitigate the risk, follow these steps:
Upgrade to an unaffected version of Apache Tomcat
Disable the FileStore function
Configure the value of sessionAttributeValueClassNameFilter to ensure that only objects with specific attributes can be serialized/deserialized
Remember to regularly update and patch your software, and follow security best practices for server configuration and management.
Is this in CISA’s Known Exploited Vulnerabilities Catalog?
The CVE-2020-9484 vulnerability, also known as Deserialization of Untrusted Data in Apache Tomcat, is not listed in CISA's Known Exploited Vulnerabilities Catalog. This high-severity vulnerability was published on May 20, 2020, and affects specific versions of Apache Tomcat.
Weakness Enumeration
The weakness enumeration for this vulnerability is categorized as CWE-502, which involves deserialization of untrusted data in Apache Tomcat.
Learn More
For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, visit the National Vulnerability Database page or refer to the sources below:
Solutions
Solutions
The VPN replacement your workforce will love.
Solutions