Apache Tomcat Ghostcat vulnerability for ShareScan
Article # 3022373 - Page views: 742
3022373
Information:
Apache Tomcat Ghostcat vulnerability (https://cve.mitre.org/cgi-bin/cvenam...=CVE-2020-1938) has been identified. The following information can be used for eCopy ShareScan to avoid this vulnerability.
eCopy ShareScan does not utilize the AJP feature of Apache Tomcat, however the protocol is enabled by default. The recommendation is to disable AJP explicitly. Edit the <Tomcat>/conf/server.xml file and comment out the AJP.
Steps to modify Apache Tomcat configuration for eCopy ShareScan:
- Stop eCopy ShareScan Agent service
- Stop eCopy ShareScan Manager service
- Stop Apache Tomcat service
- Navigate to the Apache Tomcat install folder [by default: C:\Program Files (x86)\Kofax\Tomcat 8.5\conf\server.xml]
- Edit the Server.XML file
- Find the line <Connector port = “8009” protocol = “AJP / 1.x” redirectPort = “8443” />
- Edit the line to comment it out, by changing it to [<!--<Connector port="8009" protocol="AJP/1.3" redirectPort="8443" />--> ]
- Save the Server.XML file
- Start Apache Tomcat service
- Start eCopy ShareScan Agent and Manager services
Links about the vulnerability:
https://www.chaitin.cn/en/ghostcat
https://blog.trendmicro.com/trendlab...vd-2020-10487/
Applies to:
Product | Version |
---|---|
eCopy ShareScan | all versions |