<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic GhostCat - Critical Apache Tomcat Vulnerability in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/GhostCat-Critical-Apache-Tomcat-Vulnerability/m-p/33206#M2392</link>
    <description>&lt;P&gt;Patch your Apache Tomcat servers NOW!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ALL versions (9.x/8.x/7.x/6.x) released in the past 13 years have been found vulnerable to a new &lt;STRONG&gt;CRITICAL&lt;/STRONG&gt; (&lt;STRONG&gt;CVSS 9.8&lt;/STRONG&gt;) vulnerability dubbed "&lt;STRONG&gt;GhostCat&lt;/STRONG&gt;" (&lt;STRONG&gt;CVE-2020-1938&lt;/STRONG&gt;). The flaw (&lt;A href="https://www.chaitin.cn/en/ghostcat" target="_blank" rel="noopener"&gt;described here&lt;/A&gt;) could let unauthenticated, remote attackers read the content of any file on a vulnerable web server and obtain sensitive configuration files or source code, or execute arbitrary code if the server allows file upload. There of lots of PoC exploits in the wild. Drop what you are doing now and &lt;A href="http://tomcat.apache.org/security.html" target="_blank" rel="noopener"&gt;upgrade&lt;/A&gt;!&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:27:07 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2023-10-09T09:27:07Z</dc:date>
    <item>
      <title>GhostCat - Critical Apache Tomcat Vulnerability</title>
      <link>https://community.isc2.org/t5/Tech-Talk/GhostCat-Critical-Apache-Tomcat-Vulnerability/m-p/33206#M2392</link>
      <description>&lt;P&gt;Patch your Apache Tomcat servers NOW!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ALL versions (9.x/8.x/7.x/6.x) released in the past 13 years have been found vulnerable to a new &lt;STRONG&gt;CRITICAL&lt;/STRONG&gt; (&lt;STRONG&gt;CVSS 9.8&lt;/STRONG&gt;) vulnerability dubbed "&lt;STRONG&gt;GhostCat&lt;/STRONG&gt;" (&lt;STRONG&gt;CVE-2020-1938&lt;/STRONG&gt;). The flaw (&lt;A href="https://www.chaitin.cn/en/ghostcat" target="_blank" rel="noopener"&gt;described here&lt;/A&gt;) could let unauthenticated, remote attackers read the content of any file on a vulnerable web server and obtain sensitive configuration files or source code, or execute arbitrary code if the server allows file upload. There of lots of PoC exploits in the wild. Drop what you are doing now and &lt;A href="http://tomcat.apache.org/security.html" target="_blank" rel="noopener"&gt;upgrade&lt;/A&gt;!&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:27:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/GhostCat-Critical-Apache-Tomcat-Vulnerability/m-p/33206#M2392</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T09:27:07Z</dc:date>
    </item>
  </channel>
</rss>

