Skip to Main Content

Bruin Learn access is restored. UCLA Digital and Technology Solutions and Bruin Learn administrators are continuing to monitor for delays or unexpected issues with the restoration of UCLA’s Canvas environment. If you continue to experience any issues with Bruin Learn, please reach out to BruinLearn-Support@it.ucla.edu

Ghostcat Impacts All Unpatched Apache Tomcat Versions Released in the Last 13 Years

Apache Tomcat servers released in the last 13 years are vulnerable to a bug named Ghostcat that can allow hackers to takeover unpatched systems. 

Discovered by Chinese cybersecurity firm Chaitin Tech, Ghostcat is a flaw in the Tomcat AJP protocol. 

AJP stands for Apache JServ Protocol and is a performance-optimized version of the HTTP protocol in binary format. Tomcat uses AJP to exchange data with nearby Apache HTTPD web servers or other Tomcat instances.  

Tomcat's AJP connector is enabled by default on all Tomcat servers and listens on the server's port 8009.

RELATED INFORMATION

ZDNet Ghostcat article