Lucene search

K
nvd[email protected]NVD:CVE-2020-9484
HistoryMay 20, 2020 - 7:15 p.m.

CVE-2020-9484

2020-05-2019:15:09
CWE-502
web.nvd.nist.gov

4.4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.922 High

EPSS

Percentile

99.0%

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter=“null” (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.

Affected configurations

NVD
Node
apachetomcatRange7.0.07.0.108
OR
apachetomcatRange8.5.08.5.63
OR
apachetomcatRange9.0.19.0.43
OR
apachetomcatMatch9.0.0milestone1
OR
apachetomcatMatch9.0.0milestone10
OR
apachetomcatMatch9.0.0milestone11
OR
apachetomcatMatch9.0.0milestone12
OR
apachetomcatMatch9.0.0milestone13
OR
apachetomcatMatch9.0.0milestone14
OR
apachetomcatMatch9.0.0milestone15
OR
apachetomcatMatch9.0.0milestone16
OR
apachetomcatMatch9.0.0milestone17
OR
apachetomcatMatch9.0.0milestone18
OR
apachetomcatMatch9.0.0milestone19
OR
apachetomcatMatch9.0.0milestone2
OR
apachetomcatMatch9.0.0milestone20
OR
apachetomcatMatch9.0.0milestone21
OR
apachetomcatMatch9.0.0milestone22
OR
apachetomcatMatch9.0.0milestone23
OR
apachetomcatMatch9.0.0milestone24
OR
apachetomcatMatch9.0.0milestone25
OR
apachetomcatMatch9.0.0milestone26
OR
apachetomcatMatch9.0.0milestone27
OR
apachetomcatMatch9.0.0milestone3
OR
apachetomcatMatch9.0.0milestone4
OR
apachetomcatMatch9.0.0milestone5
OR
apachetomcatMatch9.0.0milestone6
OR
apachetomcatMatch9.0.0milestone7
OR
apachetomcatMatch9.0.0milestone8
OR
apachetomcatMatch9.0.0milestone9
OR
apachetomcatMatch10.0.0milestone1
OR
apachetomcatMatch10.0.0milestone2
OR
apachetomcatMatch10.0.0milestone3
OR
apachetomcatMatch10.0.0milestone4
Node
debiandebian_linuxMatch8.0
OR
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
Node
opensuseleapMatch15.1
Node
fedoraprojectfedoraMatch31
OR
fedoraprojectfedoraMatch32
Node
canonicalubuntu_linuxMatch16.04lts
OR
canonicalubuntu_linuxMatch20.04lts
Node
oracleagile_engineering_data_managementMatch6.2.1.0
OR
oracleagile_plmMatch9.3.3
OR
oracleagile_plmMatch9.3.5
OR
oracleagile_plmMatch9.3.6
OR
oraclecommunications_cloud_native_core_binding_support_functionMatch1.10.0
OR
oraclecommunications_cloud_native_core_policyMatch1.14.0
OR
oraclecommunications_diameter_signaling_routerRange8.0.0.08.4.0.5
OR
oraclecommunications_element_managerRange8.2.08.2.2
OR
oraclecommunications_instant_messaging_serverMatch10.0.1.4.0
OR
oraclecommunications_session_report_managerRange8.2.08.2.2
OR
oraclecommunications_session_route_managerRange8.2.08.2.2
OR
oracledatabaseMatch12.2.0.1enterprise
OR
oracledatabaseMatch19centerprise
OR
oracledatabaseMatch21centerprise
OR
oraclefmw_platformMatch12.2.1.3.0
OR
oraclefmw_platformMatch12.2.1.4.0
OR
oraclehospitality_guest_accessMatch4.2.0
OR
oraclehospitality_guest_accessMatch4.2.1
OR
oracleinstantis_enterprisetrackRange17.117.3
OR
oraclemanaged_file_transferMatch12.2.1.3.0
OR
oraclemanaged_file_transferMatch12.2.1.4.0
OR
oraclemysql_enterprise_monitorRange8.0.21
OR
oracleretail_order_brokerMatch15.0
OR
oraclesiebel_apps_-_marketingRange21.9
OR
oraclesiebel_ui_frameworkRange20.12
OR
oracletransportation_managementMatch6.3.7
OR
oracleworkload_managerMatch12.2.0.1
OR
oracleworkload_managerMatch18c
OR
oracleworkload_managerMatch19c
Node
mcafeeepolicy_orchestratorMatch5.9.0
OR
mcafeeepolicy_orchestratorMatch5.9.1
OR
mcafeeepolicy_orchestratorMatch5.10.0-
OR
mcafeeepolicy_orchestratorMatch5.10.0update_1
OR
mcafeeepolicy_orchestratorMatch5.10.0update_2
OR
mcafeeepolicy_orchestratorMatch5.10.0update_3

References

4.4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.922 High

EPSS

Percentile

99.0%