{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T23:16:32.508","vulnerabilities":[{"cve":{"id":"CVE-2020-1745","sourceIdentifier":"secalert@redhat.com","published":"2020-04-28T15:15:13.037","lastModified":"2024-11-21T05:11:17.617","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution."},{"lang":"es","value":"Se encontró una vulnerabilidad de inclusión de archivo en el conector AJP habilitado con un puerto de configuración AJP predeterminado de 8009 en Undertow versión 2.0.29.Final y anteriores y se corrigió en la versión 2.0.30.Final. Un atacante remoto no autenticado podría explotar esta vulnerabilidad para leer archivos de aplicaciones web desde un servidor vulnerable. En los casos en que el servidor vulnerable permite la carga de archivos, un atacante podría cargar código malicioso JavaServer Pages (JSP) dentro de una variedad de tipos de archivos y desencadenar esta vulnerabilidad para conseguir una ejecución de código remota."}],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-285"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0.29","matchCriteriaId":"3C8F458A-06B7-474B-9C5C-756F893886D1"}]}]}],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1745","source":"secalert@redhat.com","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/","source":"secalert@redhat.com","tags":["Not Applicable"]},{"url":"https://security.netapp.com/advisory/ntap-20240216-0011/","source":"secalert@redhat.com"},{"url":"https://www.cnvd.org.cn/webinfo/show/5415","source":"secalert@redhat.com","tags":["Not Applicable"]},{"url":"https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487","source":"secalert@redhat.com","tags":["Not Applicable"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1745","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"]},{"url":"https://security.netapp.com/advisory/ntap-20240216-0011/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.cnvd.org.cn/webinfo/show/5415","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"]},{"url":"https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"]}]}}]}