

#Apache tomcat 9.0 31 code
It is, therefore, affected by multiple vulnerabilities : - An arbitrary file read vulnerability in AJP protocol due to an implementation defect which could also be leveraged to achieve remote code execution. However, this configuration is at your own risk, as it may not have been fully certified against your current Pentaho version. Description The version of Apache Tomcat installed on the remote host is 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 or 7.0.0 to 7.0.99.
#Apache tomcat 9.0 31 upgrade

If AJP Connectors are disabled or the AJP ports are not accessible to untrusted users, you are not exposed to this vulnerability.

We recommend that AJP Connectors be manually disabled unless you require them. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, the AJP Connector is enabled by default, meaning it can listen on all configured IP addresses. Each vulnerability is given a security impact rating by the. If such connections are available to an attacker, they may be exploited in ways that may represent a risk. This page lists all security vulnerabilities fixed in released versions of Apache Tomcat 9.x. If set to true, the default, the AJP Connector will not start unless a secret has been specified. In 9.0.31 onwards, the secretRequired attribute was added to the AJP Connector. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. In 9.0.31 onwards, the requiredSecret attribute of the AJP Connector was deprecated and replaced by the secret attribute. It is mainly used in a cluster or reverse proxy scenario where web servers communicate with application servers or servlet containers. The AJP is a binary protocol used by the Apache Tomcat webserver to communicate with the servlet container that sits behind the webserver using TCP connections. A recent vulnerability in Tomcat’s Apache JServ Protocol (AJP) Connector ( CVE-2020-1938) has raised concern among some Pentaho customers that they may be exposed to a security risk, specifically because of the vulnerability’s potential use for remote code execution.Īfter careful review, Pentaho recommends that an upgrade to Tomcat 8.5.51 is necessary if AJP connectors are enabled.
