CVE-2020-1938 is a file read/inclusion vulnerability in the AJP connector in Apache Tomcat. This is enabled by default with a default configuration port of 8009. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution (RCE).
Please refer to the Red Hat knowledgebase article: <https://access.redhat.com/solutions/4851251>
bugzilla.redhat.com/show_bug.cgi?id=1806398
meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/
nvd.nist.gov/vuln/detail/CVE-2020-1938
tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100
tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51
tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31
www.cnvd.org.cn/webinfo/show/5415
www.cve.org/CVERecord?id=CVE-2020-1938
www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487