{"id":"RHSA-2020:1478","summary":"Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update","modified":"2026-02-24T10:02:54Z","published":"2024-09-16T02:34:02Z","upstream":["CVE-2020-1938"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:1478"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/6.4/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1806398"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1478.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-1938"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-1938"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1938"},{"type":"ARTICLE","url":"https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/"},{"type":"ARTICLE","url":"https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100"},{"type":"ARTICLE","url":"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51"},{"type":"ARTICLE","url":"https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31"},{"type":"ARTICLE","url":"https://www.cnvd.org.cn/webinfo/show/5415"},{"type":"ARTICLE","url":"https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"}],"affected":[{"package":{"name":"jbossweb","ecosystem":"Red Hat:jboss_enterprise_application_platform:6::el5","purl":"pkg:rpm/redhat/jbossweb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.5.30-2.Final_redhat_2.1.ep6.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1478.json"}},{"package":{"name":"jbossweb","ecosystem":"Red Hat:jboss_enterprise_application_platform:6::el6","purl":"pkg:rpm/redhat/jbossweb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.5.30-2.Final_redhat_2.1.ep6.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1478.json"}},{"package":{"name":"jbossweb","ecosystem":"Red Hat:jboss_enterprise_application_platform:6::el7","purl":"pkg:rpm/redhat/jbossweb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.5.30-2.Final_redhat_2.1.ep6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1478.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"}]}