安全公告/【CVE-2020-9484】

基本信息

漏洞名称:
受影响操作系统:Asianux
危险等级:高危
影响源码包:tomcat9
CVSS评分:7
发现日期:2023-08-02
修复版本:9.0.31-1~deb10u2

漏洞描述

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.

修复方式

sudo apt update && sudo apt dist-upgrade

漏洞判定

执行命令apt policy PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复

补丁

参考

https://security-tracker.debian.org/tracker/CVE-2020-9484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484
https://nvd.nist.gov/vuln/detail/CVE-2020-9484