Lucene search

K
nessusThis script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.AJP_LFI_GHOSTCAT.NBIN
HistoryMar 24, 2020 - 12:00 a.m.

Apache Tomcat AJP Connector Request Injection (Ghostcat)

2020-03-2400:00:00
This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
188

A file read/inclusion vulnerability was found in AJP connector. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and gain remote code execution (RCE).

Binary data ajp_lfi_ghostcat.nbin
VendorProductVersionCPE
apachetomcatcpe:/a:apache:tomcat