Dear users,
Ghostcat is a serious vulnerability in Apache Tomcat discovered by security researcher of Chaitin Tech. Due to a flaw in the Tomcat AJP protocol, an attacker can read or include any files in the webapp directories of Tomcat. For example, an attacker can read the webapp configuration files or source code.
In addition, if the target web application has a file upload function, the attacker may execute malicious code on the target host by exploiting file inclusion through Ghostcat vulnerability.
Reference:
As we never used AJP protocols, all versions of ServiceDesk Plus are safe from this Ghostcast vulnerability.
We will keep this post updated on any further updates.