Skip to content

Critical Apache Tomcat Vulnerability 'Ghostcat' Affects Widely Used Versions

Ghostcat, rated 9.8 on the CVSS v3 scale, impacts popular Apache Tomcat versions. Disable AJP on port 8009 and upgrade to protect your servers.

Here in this picture we can see a hornet present on the ground and beside that we can see some...
Here in this picture we can see a hornet present on the ground and beside that we can see some grass also present.

Critical Apache Tomcat Vulnerability 'Ghostcat' Affects Widely Used Versions

A critical security vulnerability, Ghostcat (CVE-2020-1938), has been discovered in Apache Tomcat's Apache JServ Protocol. This issue, rated 9.8 on the CVSS v3 scale, affects widely used versions of Apache Tomcat and could allow attackers to gain access to sensitive files and potentially execute remote code.

The vulnerability, found by Semmle, is present in Apache Tomcat 6.x before 6.0.53, 7.x before 7.0.88, and 8.x before 8.5.49. It's also present in newer versions, including 9.0.0 to 9.0.30, 8.5.0 to 8.5.50, and 7.0.0 to 7.0.99. Apache Tomcat AJP, enabled by default on port 8009, is commonly used for communication between Tomcat and Apache web servers.

Exploitation of Ghostcat can lead to access to configuration files. If arbitrary file upload is not disabled, it may enable remote code execution. Qualys Web Application Scanning (WAS) can detect Ghostcat by enabling QID 150282 in option profiles. Other attack vectors include arbitrary file upload (QID 150114) and file upload form found (QID 150125).

To remediate, users should disable port 8009, restart the Apache web server, and define a strong secret key attribute requiredSecret in server.xml. Upgrading to patched versions of Apache Tomcat is also recommended to ensure protection against this critical vulnerability.

Read also:

Latest