This parameter is supported by current versions of httpd in Red Hat Enterprise Linux 7 and 8, but the version included in Red Hat Software Collections do not support this parameter, so another mitigation strategy must be employed.Ĭonfiguration showing how to disable AJP and how to protect it with a secret is shown below, for various Red Hat products. Protecting AJP with a secret may be less disruptive, but requires using either mod_jk or a version of httpd that supports the secret parameter. The first option, disabling AJP, is the most secure and robust recommended solution. Use only network binding and firewall configuration to ensure incoming connections are only allowed from trusted hosts.Protect the AJP connection with a secret, as well as carefully reviewing network binding and firewall configuration to ensure incoming connections are only allowed from trusted hosts.HTTP and HTTPS do not contain the same trust issues as AJP. Disable AJP altogether in Tomcat, and instead use HTTP or HTTPS for incoming proxy connections.In order of preference, one of the following mitigations should be applied: The preventive measures should be taken by using the configuration that will not allow AJP to be exposed. It is insecure (clear text transmission) and assumes that your network is safe. AJP is a highly trusted protocol and should never be exposed to untrusted clients. This is a configuration issue with AJP protocol in Tomcat/Undertow. In instances where a poorly configured server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types to gain remote code execution (RCE).ĬVE-2020-1745 is a file read/inclusion using the AJP connector in Undertow and very similar to CVE-2020-1938. A remote, unauthenticated/untrusted attacker could exploit this AJP configuration to read web application files from a server exposing the AJP port to untrusted clients. The AJP protocol is enabled by default, with the AJP connector listening in TCP port 8009 and bond to IP address 0.0.0.0. 8.x (as pki-servlet-container, pki-servlet-engine in pki-deps module)ĬVE-2020-1938 is a file read/inclusion using the AJP connector in Apache Tomcat.Red Hat JBoss Enterprise Application Platform (EAP).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |