Remote Code Execution in Apache Tomcat Due to FileStore Configuration Issues
CVE-2020-9484
Key Information:
- Vendor
Apache
- Status
- Vendor
- CVE Published:
- 20 May 2020
Badges
What is CVE-2020-9484?
This vulnerability in Apache Tomcat arises when an attacker can manipulate a file's contents and name on the server while the server's PersistenceManager is using a FileStore configuration. If the sessionAttributeValueClassNameFilter is set to 'null' or a permissive value, an attacker familiar with the file's relative path can exploit this flaw. By sending a perfectly crafted request, the attacker can trigger remote code execution through the deserialization of the compromised file.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Apache Tomcat Apache Tomcat 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54, 7.0.0 to 7.0.103
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
93% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved