CVE编号
CVE-2020-11996利用情况
暂无补丁情况
官方补丁披露时间
2020-06-27漏洞描述
Apache Tomcat是美国阿帕奇(Apache)软件基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat 10.0.0-M1版本至10.0.0-M5版本、9.0.0.M1版本至9.0.35版本和8.5.0版本至8.5.55版本中存在安全漏洞。攻击者可通过发出大量请求利用该漏洞导致服务器无法响应。解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://lists.apache.org/thread.html/r5541ef6b6b68b49f76fc4c45695940116da2bcbe0312ef204a00a2e0%40%3Cannounce.tomcat.apache.org%3E
参考链接 |
|
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00064.html | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00072.html | |
https://lists.apache.org/thread.html/r2529016c311ce9485e6f173446d469600fdfbb9... | |
https://lists.apache.org/thread.html/r3ea96d8f36dd404acce83df8aeb22a9e807d6c1... | |
https://lists.apache.org/thread.html/r5541ef6b6b68b49f76fc4c45695940116da2bcb... | |
https://lists.apache.org/thread.html/r5a4f80a6acc6607d61dae424b643b594c6188dd... | |
https://lists.apache.org/thread.html/r6c29801370a36c1a5159679269777ad0c73276d... | |
https://lists.apache.org/thread.html/r74f5a8204efe574cbfcd95b2a16236fe95beb45... | |
https://lists.apache.org/thread.html/r8f3d416c193bc9384a8a7dd368623d441f5fcaf... | |
https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c... | |
https://lists.apache.org/thread.html/r93ca628ef3a4530dfe5ac49fddc795f0920a4b2... | |
https://lists.apache.org/thread.html/r9ad911fe49450ed9405827af0e7a74104041081... | |
https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f... | |
https://lists.apache.org/thread.html/rb4ee49ecc4c59620ffd5e66e84a17e526c2c3cf... | |
https://lists.apache.org/thread.html/rb820f1a2a02bf07414be12c653c2ab5321fd87b... | |
https://lists.apache.org/thread.html/rc80b96b4b96618b2b7461cb90664a428cfd6605... | |
https://lists.apache.org/thread.html/rea65d6ef2e45dd1c45faae83922042732866c7b... | |
https://lists.apache.org/thread.html/ref0339792ac6dac1dba83c071a727ad72380899... | |
https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html | |
https://security.netapp.com/advisory/ntap-20200709-0002/ | |
https://usn.ubuntu.com/4596-1/ | |
https://www.debian.org/security/2020/dsa-4727 | |
https://www.oracle.com/security-alerts/cpujan2021.html | |
https://www.oracle.com/security-alerts/cpuoct2020.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | apache | tomcat | * |
From (including) 8.5.0 |
Up to (including) 8.5.55 |
||||
运行在以下环境 | |||||||||
应用 | apache | tomcat | * |
From (including) 9.0.0 |
Up to (including) 9.0.35 |
||||
运行在以下环境 | |||||||||
应用 | apache | tomcat | 10.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | tomcat | 9.0.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | tomcat8 | * |
Up to (excluding) 9.0.31-1~deb10u2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | tomcat8 | * |
Up to (excluding) 8.5.54-0+deb9u2 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | tomcat8 | * |
Up to (excluding) 9.0.36-lp151.3.24.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | tomcat8 | * |
Up to (excluding) 9.0.36-lp152.2.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12_SP5 | tomcat8 | * |
Up to (excluding) 9.0.36-3.42.2 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | tomcat8 | * |
Up to (excluding) 9.0.36-3.42.2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | tomcat8 | * |
Up to (excluding) 9.0.31-1ubuntu0.1 |
|||||
运行在以下环境 | |||||||||
系统 | unionos_20 | tomcat8 | * |
Up to (excluding) 9.0.31-1~deb10u2 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...