CVE-2020-1745
ADVISORY - githubSummary
A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.
EPSS Score: 0.02399 (0.845)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Improper Authorization
ADVISORY - github
Improper Authorization
ADVISORY - gitlab
ADVISORY - redhat
Improper Authorization
NIST
CREATED
UPDATED
ADVISORY IDCVE-2020-1745
EXPLOITABILITY SCORE
3.9
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
8.6highGitHub
CREATED
UPDATED
ADVISORY IDGHSA-gv2w-88hx-8m9r
EXPLOITABILITY SCORE
3.9
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
8.6highDebian
CREATED
UPDATED
ADVISORY IDCVE-2020-1745
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
Ubuntu
CREATED
UPDATED
ADVISORY IDCVE-2020-1745
EXPLOITABILITY SCORE
3.9
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
9.8mediumRed Hat
CREATED
UPDATED
ADVISORY IDCVE-2020-1745
EXPLOITABILITY SCORE
2.8
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)