Remote Code Execution (RCE)

Affecting org.apache.tomcat.embed:tomcat-embed-core artifact, versions [10.0.0-M1, 10.0.0-M5) || [9.0.0M1, 9.0.35) || [8.5.0, 8.5.55) || [7.0.0, 7.0.104)

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

org.apache.tomcat.embed:tomcat-embed-core is a Core Tomcat implementation.

Affected versions of this package are vulnerable to Remote Code Execution (RCE). If an attacker is able to control the contents and name of a file on the server; and the server is configured to use the PersistenceManager with a FileStore; and the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control.

Remediation

Upgrade org.apache.tomcat.embed:tomcat-embed-core to version 10.0.0-M5, 9.0.35, 8.5.55, 7.0.104 or higher.

References

CVSS Score

8.1
high severity
  • Attack Vector
    Network
  • Attack Complexity
    High
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F
Credit
Apache Tomcat Security Team
CVE
CVE-2020-9484
CWE
CWE-94
Snyk ID
SNYK-JAVA-ORGAPACHETOMCATEMBED-570072
Disclosed
21 May, 2020
Published
20 May, 2020