CVE-2020-1938
Java vulnerability analysis and mitigation

Overview

CVE-2020-1938, also known as the Ghostcat vulnerability, was discovered in Apache Tomcat's Apache JServ Protocol (AJP) implementation. The vulnerability was disclosed on February 24, 2020, affecting Apache Tomcat versions 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50, and 7.0.0 to 7.0.99. The vulnerability exists in the AJP connector, which was enabled by default and listened on all configured IP addresses (NVD).

Technical details

The vulnerability stems from Apache Tomcat treating AJP connections with higher trust than HTTP connections. When the AJP Connector is enabled, an attacker can exploit this to: 1) return arbitrary files from anywhere in the web application, and 2) process any file in the web application as a JSP. If the web application allows file upload or if the attacker can control web application content, this vulnerability could lead to remote code execution. The vulnerability received a CVSS v3.1 base score of 9.8 (CRITICAL) (NVD).

Impact

Successful exploitation of this vulnerability could lead to unauthorized file access, information disclosure, and potential remote code execution if certain conditions are met. The attacker could read sensitive files within the web application scope and execute malicious code by processing uploaded files as JSP (NVD).

Mitigation and workarounds

Users should upgrade to Apache Tomcat versions 9.0.31, 8.5.51, or 7.0.100 or later. If immediate upgrade is not possible, ensure the AJP port is not accessible to untrusted users. The fix includes changes to the default AJP Connector configuration to harden security. Users upgrading to the fixed versions may need to make small configuration changes (NVD).

Community reactions

The vulnerability received significant attention from the security community due to its critical severity and the widespread use of Apache Tomcat. Multiple vendors and Linux distributions issued security advisories and patches, including Red Hat, Debian, and Oracle (Oracle).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-48392HIGH7.5
  • JavaJava
  • org.apache.iotdb:iotdb-core
NoYesSep 24, 2025
CVE-2025-43816MEDIUM6.9
  • JavaJava
  • com.liferay:com.liferay.portal.vulcan.impl
NoYesSep 25, 2025
CVE-2025-56769MEDIUM6.5
  • JavaJava
  • cn.hutool:hutool-extra
NoYesSep 25, 2025
CVE-2025-48459MEDIUM5.3
  • JavaJava
  • org.apache.iotdb:iotdb-confignode
NoYesSep 24, 2025
CVE-2025-58457MEDIUM4.3
  • JavaJava
  • cpe:2.3:a:apache:zookeeper
NoYesSep 24, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management