<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Katie McCaskey</title>
    <description>The latest articles on Forem by Katie McCaskey (@katiemccaskey).</description>
    <link>https://forem.com/katiemccaskey</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F284875%2Fbced2d5d-0990-49da-8c92-c8852f585a17.jpg</url>
      <title>Forem: Katie McCaskey</title>
      <link>https://forem.com/katiemccaskey</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/katiemccaskey"/>
    <language>en</language>
    <item>
      <title>Ryan Lockard Names the Seven Deadly Sins of DevSecOps</title>
      <dc:creator>Katie McCaskey</dc:creator>
      <pubDate>Thu, 02 Apr 2020 13:45:00 +0000</pubDate>
      <link>https://forem.com/sonatype/ryan-lockard-names-the-seven-deadly-sins-of-devsecops-4dbd</link>
      <guid>https://forem.com/sonatype/ryan-lockard-names-the-seven-deadly-sins-of-devsecops-4dbd</guid>
      <description>&lt;p&gt;&lt;a href="https://blog.sonatype.com/ryan-lockard-names-the-seven-deadly-sins-of-devsecops"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zBoSUyjj--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.sonatype.com/hubfs/GettyImages-1139085522.png" alt="Ryan Lockard Names the Seven Deadly Sins of DevSecOps [VIDEO]"&gt; &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;_ &lt;strong&gt;Editor's Note:&lt;/strong&gt; _ &lt;em&gt;Ryan's story is included in "&lt;a href="https://www.sonatype.com/epic-failures-2"&gt;Epic Failures in DevSecOps, Volume 2&lt;/a&gt;", available for free download.&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"It is said in Roman Catholicism that each of the seven deadly sins is uniquely bad. Any time one of these sins are committed, we must confess them and do all that we can to not transgress again. Applying the DevSecOps context, each of the failures discussed in this chapter are an opportunity to reflect, inspect and improve our own DevSecOps practices every day." -- Ryan Lockard, &lt;em&gt;Epic Failures in DevSecOps&lt;/em&gt;, Chapter 7.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://blog.sonatype.com/ryan-lockard-names-the-seven-deadly-sins-of-devsecops"&gt;Watch his interview with host Justin Miller, on the Sonatype blog&lt;/a&gt;&lt;/p&gt;

</description>
      <category>appsec</category>
      <category>applicationsecurity</category>
      <category>devsecops</category>
      <category>newsandviews</category>
    </item>
    <item>
      <title>SAML/SSO Authentication and Conan in Nexus Repository 3.22</title>
      <dc:creator>Katie McCaskey</dc:creator>
      <pubDate>Wed, 01 Apr 2020 19:16:54 +0000</pubDate>
      <link>https://forem.com/sonatype/saml-sso-authentication-and-conan-in-nexus-repository-3-22-20n0</link>
      <guid>https://forem.com/sonatype/saml-sso-authentication-and-conan-in-nexus-repository-3-22-20n0</guid>
      <description>&lt;p&gt;By &lt;a href="https://dev.to/brent_kostak"&gt;Brent Kostak&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://blog.sonatype.com/saml/sso-authentication-and-conan-in-nexus-repository-3.22"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zCyIlspC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.sonatype.com/hubfs/GettyImages-1148091063.png" alt="single sign-on"&gt; &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Introducing the release of &lt;a href="https://help.sonatype.com/repomanager3/release-notes/2020-release-notes#id-2020ReleaseNotes-RepositoryManager3.22.0"&gt;Nexus Repository 3.22&lt;/a&gt;. Our product teams are excited to announce &lt;a href="https://help.sonatype.com/repomanager3/security/saml"&gt;SAML/SSO&lt;/a&gt; authentication for Nexus Repository Pro. In addition to SAML/SSO, this release includes proxy support for Conan native format in both &lt;a href="https://www.sonatype.com/product-nexus-repository"&gt;Nexus Repository Pro&lt;/a&gt; users and our free version, &lt;a href="https://www.sonatype.com/nexus-repository-oss"&gt;Nexus Repository OSS&lt;/a&gt;. Conan is the decentralized, portable, and extensible package manager for C/C++ projects.&lt;/p&gt;

&lt;p&gt;Amidst much anticipation, Nexus Repository Pro now provides users the ability to authenticate with Security Assertion Markup Language (SAML) identity providers. Using SAML, users can now experience single sign-on (SSO) when logging into the Nexus ecosystem. In the reading ahead, we will ‘pop the hood’ on SAML to learn how it works with Nexus Repository Pro, what benefits users can gain setting up the SAML integration, and key highlights for both Nexus Repository admins and developers.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--2kQ61Qyb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://track.hubspot.com/__ptq.gif%3Fa%3D1958393%26k%3D14%26r%3Dhttps%253A%252F%252Fblog.sonatype.com%252Fsaml%252Fsso-authentication-and-conan-in-nexus-repository-3.22%26bu%3Dhttps%25253A%25252F%25252Fblog.sonatype.com%26bvt%3Drss" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--2kQ61Qyb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://track.hubspot.com/__ptq.gif%3Fa%3D1958393%26k%3D14%26r%3Dhttps%253A%252F%252Fblog.sonatype.com%252Fsaml%252Fsso-authentication-and-conan-in-nexus-repository-3.22%26bu%3Dhttps%25253A%25252F%25252Fblog.sonatype.com%26bvt%3Drss" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://blog.sonatype.com/saml/sso-authentication-and-conan-in-nexus-repository-3.22"&gt;Read more on the Sonatype blog&lt;/a&gt;&lt;/p&gt;

</description>
      <category>nexusrepository</category>
      <category>featured</category>
      <category>cc</category>
      <category>saml</category>
    </item>
    <item>
      <title>Developers Gain Contextual Feedback with Automated Pull Request Commenting</title>
      <dc:creator>Katie McCaskey</dc:creator>
      <pubDate>Tue, 31 Mar 2020 15:14:09 +0000</pubDate>
      <link>https://forem.com/sonatype/developers-gain-contextual-feedback-with-automated-pull-request-commenting-2875</link>
      <guid>https://forem.com/sonatype/developers-gain-contextual-feedback-with-automated-pull-request-commenting-2875</guid>
      <description>&lt;p&gt;&lt;a href="https://blog.sonatype.com/developers-gain-contextual-feedback-with-automated-pull-request-commenting"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--pNJryLr2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.sonatype.com/hubfs/GettyImages-1198272365.png" alt="Developers Gain Contextual Feedback with Automated Pull Request Commenting"&gt; &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;At Sonatype, we work continuously to increase awareness of open source risk, and decrease the time it takes you to make your applications safe. It is our never ending quest to shift security left. We’ve rolled out even more granular and automated policy feedback with pull request comments directly in GitHub. &lt;/p&gt;

&lt;p&gt;Developers need to know where potential policy violations or security vulnerabilities are introduced so that they can address and fix the issues efficiently and effectively. This reduces time to remediation and minimizes manual work. Our new PR commenting feature for GitHub notifies a developer when the code they commit introduces risk or breaks a build, and why.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--3EqqwUJJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://track.hubspot.com/__ptq.gif%3Fa%3D1958393%26k%3D14%26r%3Dhttps%253A%252F%252Fblog.sonatype.com%252Fdevelopers-gain-contextual-feedback-with-automated-pull-request-commenting%26bu%3Dhttps%25253A%25252F%25252Fblog.sonatype.com%26bvt%3Drss" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--3EqqwUJJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://track.hubspot.com/__ptq.gif%3Fa%3D1958393%26k%3D14%26r%3Dhttps%253A%252F%252Fblog.sonatype.com%252Fdevelopers-gain-contextual-feedback-with-automated-pull-request-commenting%26bu%3Dhttps%25253A%25252F%25252Fblog.sonatype.com%26bvt%3Drss" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://blog.sonatype.com/developers-gain-contextual-feedback-with-automated-pull-request-commenting"&gt;Read more on the Sonatype blog&lt;/a&gt;&lt;/p&gt;

</description>
      <category>github</category>
      <category>vulnerabilities</category>
      <category>opensourcegovernance</category>
      <category>automation</category>
    </item>
    <item>
      <title>Department of Defense DevSecOps Journey</title>
      <dc:creator>Katie McCaskey</dc:creator>
      <pubDate>Mon, 30 Mar 2020 14:15:25 +0000</pubDate>
      <link>https://forem.com/sonatype/department-of-defense-devsecops-journey-12nk</link>
      <guid>https://forem.com/sonatype/department-of-defense-devsecops-journey-12nk</guid>
      <description>&lt;p&gt;&lt;a href="https://blog.sonatype.com/department-of-defense-devsecops-journey"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--bP4CT2w4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.sonatype.com/hubfs/GettyImages-1163415073.png" alt="fighter jet"&gt; &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;By &lt;a href="https://dev.to/sylviafronczak"&gt;Sylvia Fronczak&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;_ &lt;strong&gt;Editors Note:&lt;/strong&gt; _ We recently discussed why the &lt;a href="https://blog.sonatype.com/top-6-reasons-the-time-is-now-for-devsecops-in-the-federal-government"&gt;federal government should adopt DevSecOps&lt;/a&gt;. Here, a look at DevSecOps efforts at the Department of Defense presented at All Day DevOps. Sign up now for the upcoming &lt;a href="https://www.alldaydevops.com/register-springbreak-2020"&gt;All Day DevOps | Spring Break Edition&lt;/a&gt; happening April 17.&lt;/p&gt;

&lt;p&gt;The U.S. Department of Defense (DoD) has a unique DevSecOps journey, and we'll discuss that today thanks to a presentation by Hasan Yasar and Nicolas Chaillan (&lt;a href="https://twitter.com/NicolasChaillan"&gt;@NicolasChaillan&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;But first, here’s some background on the DoD. &lt;/p&gt;

&lt;p&gt;The DoD depends on software, but it doesn’t always control development. Instead, they must maintain software written elsewhere. Difficulties arise when the entire lifecycle is out of their hands.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ga6bsvkk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://track.hubspot.com/__ptq.gif%3Fa%3D1958393%26k%3D14%26r%3Dhttps%253A%252F%252Fblog.sonatype.com%252Fdepartment-of-defense-devsecops-journey%26bu%3Dhttps%25253A%25252F%25252Fblog.sonatype.com%26bvt%3Drss" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ga6bsvkk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://track.hubspot.com/__ptq.gif%3Fa%3D1958393%26k%3D14%26r%3Dhttps%253A%252F%252Fblog.sonatype.com%252Fdepartment-of-defense-devsecops-journey%26bu%3Dhttps%25253A%25252F%25252Fblog.sonatype.com%26bvt%3Drss" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://blog.sonatype.com/department-of-defense-devsecops-journey"&gt;Read more on the Sonatype blog&lt;/a&gt;&lt;/p&gt;

</description>
      <category>government</category>
      <category>devsecops</category>
      <category>departmentofdefense</category>
      <category>newsandviews</category>
    </item>
    <item>
      <title>Sonatype Nexus Repository 3.20 Installation, Admin Login, and Port Change [VIDEO]</title>
      <dc:creator>Katie McCaskey</dc:creator>
      <pubDate>Fri, 27 Mar 2020 13:45:00 +0000</pubDate>
      <link>https://forem.com/sonatype/sonatype-nexus-repository-3-20-installation-admin-login-and-port-change-video-1k58</link>
      <guid>https://forem.com/sonatype/sonatype-nexus-repository-3-20-installation-admin-login-and-port-change-video-1k58</guid>
      <description>&lt;p&gt;&lt;a href="https://blog.sonatype.com/sonatype-nexus-3.2-installation-admin-login-and-port-change-video"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--UXqHJSVJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.sonatype.com/hubfs/GettyImages-921518946.jpg" alt="Sonatype Nexus Repository 3.20 Installation, Admin Login, and Port Change [VIDEO]"&gt; &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There are often times in agile teams where &lt;a href="https://blog.sonatype.com/definition-of-devops"&gt;DevOps&lt;/a&gt; is constrained by bandwidth. &lt;/p&gt;

&lt;p&gt;This tutorial is aimed at developers to help them get things up and running without hassle. This will give them confidence to try out things on a working instance rather than just learning theory.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--VkDWyQTZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://track.hubspot.com/__ptq.gif%3Fa%3D1958393%26k%3D14%26r%3Dhttps%253A%252F%252Fblog.sonatype.com%252Fsonatype-nexus-3.2-installation-admin-login-and-port-change-video%26bu%3Dhttps%25253A%25252F%25252Fblog.sonatype.com%26bvt%3Drss" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--VkDWyQTZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://track.hubspot.com/__ptq.gif%3Fa%3D1958393%26k%3D14%26r%3Dhttps%253A%252F%252Fblog.sonatype.com%252Fsonatype-nexus-3.2-installation-admin-login-and-port-change-video%26bu%3Dhttps%25253A%25252F%25252Fblog.sonatype.com%26bvt%3Drss" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://blog.sonatype.com/sonatype-nexus-3.2-installation-admin-login-and-port-change-video"&gt;Watch the video at the Sonatype blog&lt;/a&gt;&lt;/p&gt;

</description>
      <category>nexusrepository</category>
      <category>featured</category>
      <category>product</category>
    </item>
    <item>
      <title>Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis</title>
      <dc:creator>Katie McCaskey</dc:creator>
      <pubDate>Thu, 26 Mar 2020 13:45:00 +0000</pubDate>
      <link>https://forem.com/sonatype/nexus-vulnerability-scanner-getting-started-with-vulnerability-analysis-l3m</link>
      <guid>https://forem.com/sonatype/nexus-vulnerability-scanner-getting-started-with-vulnerability-analysis-l3m</guid>
      <description>&lt;p&gt;&lt;a href="https://blog.sonatype.com/nexus-vulnerability-scanner-and-vulnerability-analysis"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xmjGY4U---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.sonatype.com/hubfs/GettyImages-576581752.png" alt="Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis"&gt; &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As a developer, you know the importance of building a robust application. With cyberattacks increasing every day, you should make sure your application is safe from the attacks and isn’t vulnerable.&lt;/p&gt;

&lt;p&gt;To assess your application for security and to help you find vulnerabilities in your application so you can fix them, &lt;a href="https://www.sonatype.com/appscan"&gt;Nexus Vulnerability Scanner&lt;/a&gt; would be of great help!&lt;/p&gt;

&lt;p&gt;So, in this post, I’ll be telling you what this tool is and how to use it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--mPLTrbip--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://track.hubspot.com/__ptq.gif%3Fa%3D1958393%26k%3D14%26r%3Dhttps%253A%252F%252Fblog.sonatype.com%252Fnexus-vulnerability-scanner-and-vulnerability-analysis%26bu%3Dhttps%25253A%25252F%25252Fblog.sonatype.com%26bvt%3Drss" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--mPLTrbip--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://track.hubspot.com/__ptq.gif%3Fa%3D1958393%26k%3D14%26r%3Dhttps%253A%252F%252Fblog.sonatype.com%252Fnexus-vulnerability-scanner-and-vulnerability-analysis%26bu%3Dhttps%25253A%25252F%25252Fblog.sonatype.com%26bvt%3Drss" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://blog.sonatype.com/nexus-vulnerability-scanner-and-vulnerability-analysis"&gt;Read more on the Sonatype blog&lt;/a&gt;&lt;/p&gt;

</description>
      <category>vulnerabilities</category>
      <category>security</category>
      <category>appsec</category>
      <category>applicationsecurity</category>
    </item>
    <item>
      <title>Top 6 Reasons the Time is Now for DevSecOps in the Federal Government</title>
      <dc:creator>Katie McCaskey</dc:creator>
      <pubDate>Wed, 25 Mar 2020 13:45:00 +0000</pubDate>
      <link>https://forem.com/sonatype/top-6-reasons-the-time-is-now-for-devsecops-in-the-federal-government-2722</link>
      <guid>https://forem.com/sonatype/top-6-reasons-the-time-is-now-for-devsecops-in-the-federal-government-2722</guid>
      <description>&lt;p&gt;&lt;a href="https://blog.sonatype.com/top-6-reasons-the-time-is-now-for-devsecops-in-the-federal-government"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--9zPDymYd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.sonatype.com/hubfs/GettyImages-1154438278.png" alt="Top 6 Reasons the Time is Now for DevSecOps in the Federal Government"&gt; &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Underpinning all modern technology - software and hardware - is a supply chain. However, even as “software eats the world,” or we could argue “ate the world,” there is still too little understanding of the software supply chain, with continued focus on hardware. The reality, however, is that software is much easier to pollute than hardware. While there has been an increase in awareness around the need for a coordinated application security strategy, the federal government has historically focused on playing strong defense, putting up walls at the perimeter, and at the end of the digital supply chain.&lt;/p&gt;

&lt;p&gt;It’s time to shift more security resources further left. In this way, the government can play better offense at the beginning of the digital supply chain so that federal agencies can better protect themselves and the American citizenry.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--K2IzObIo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://track.hubspot.com/__ptq.gif%3Fa%3D1958393%26k%3D14%26r%3Dhttps%253A%252F%252Fblog.sonatype.com%252Ftop-6-reasons-the-time-is-now-for-devsecops-in-the-federal-government%26bu%3Dhttps%25253A%25252F%25252Fblog.sonatype.com%26bvt%3Drss" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--K2IzObIo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://track.hubspot.com/__ptq.gif%3Fa%3D1958393%26k%3D14%26r%3Dhttps%253A%252F%252Fblog.sonatype.com%252Ftop-6-reasons-the-time-is-now-for-devsecops-in-the-federal-government%26bu%3Dhttps%25253A%25252F%25252Fblog.sonatype.com%26bvt%3Drss" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://blog.sonatype.com/top-6-reasons-the-time-is-now-for-devsecops-in-the-federal-government"&gt;Read more at the Sonatype blog&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>government</category>
      <category>devsecops</category>
      <category>featured</category>
    </item>
    <item>
      <title>Microsoft Acquires npm</title>
      <dc:creator>Katie McCaskey</dc:creator>
      <pubDate>Mon, 16 Mar 2020 19:44:03 +0000</pubDate>
      <link>https://forem.com/sonatype/microsoft-acquires-npm-591h</link>
      <guid>https://forem.com/sonatype/microsoft-acquires-npm-591h</guid>
      <description>&lt;p&gt;Today, news broke that GitHub and its parent company Microsoft, acquired npm and its public repository of open source JavaScript packages.&lt;/p&gt;

&lt;p&gt;Sonatype CTO Brian Fox shares his reaction in this post, &lt;a href="https://blog.sonatype.com/microsoft-acquires-npm-a-healthy-move-for-critical-public-infrastructure"&gt; Microsoft Acquires npm: A Healthy Move for Critical Public Infrastructure&lt;/a&gt;.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Nexus Intelligence Insights: What's in a Ghostcat? CVE-2020-1938 Apache Tomcat - Local File Inclusion Potentially Leads to RCE</title>
      <dc:creator>Katie McCaskey</dc:creator>
      <pubDate>Mon, 09 Mar 2020 13:45:00 +0000</pubDate>
      <link>https://forem.com/sonatype/nexus-intelligence-insights-what-s-in-a-ghostcat-cve-2020-1938-apache-tomcat-local-file-inclusion-potentially-leads-to-rce-30h1</link>
      <guid>https://forem.com/sonatype/nexus-intelligence-insights-what-s-in-a-ghostcat-cve-2020-1938-apache-tomcat-local-file-inclusion-potentially-leads-to-rce-30h1</guid>
      <description>&lt;p&gt;By &lt;a href="https://dev.to/axsharma"&gt;Ax Sharma&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://blog.sonatype.com/nexus-intelligence-insights-whats-in-a-ghostcat-cve-2020-1938-apache-tomcat"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--kKAht9Md--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.sonatype.com/hubfs/GettyImages-1086981736.png" alt="ghostcat"&gt; &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For this month’s Nexus Intelligence Insights, let’s dive deep into the popular &lt;em&gt;Ghostcat&lt;/em&gt; vulnerability making headlines recently.&lt;/p&gt;

&lt;p&gt;This vulnerability deserves attention as it impacts the widely used Apache Tomcat web server, has at least &lt;a href="https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487"&gt;&lt;strong&gt;5 exploits publicly available&lt;/strong&gt;&lt;/a&gt; on GitHub and &lt;a href="https://www.exploit-db.com/exploits/48143"&gt;ExploitDB&lt;/a&gt;, and has a rather simple, yet overlooked, root cause. In fact,&lt;a href="https://www.zdnet.com/article/ghostcat-bug-impacts-all-apache-tomcat-versions-released-in-the-last-13-years/"&gt;&lt;strong&gt;no version of Tomcat&lt;/strong&gt;  &lt;strong&gt;released in the last 13 years&lt;/strong&gt;&lt;/a&gt; is immune to Ghostcat, unless properly patched.&lt;/p&gt;

&lt;p&gt;The vulnerability, left unresolved, could pave an easy way for attackers to access arbitrary files on the server. The files may very well divulge sensitive information such as proprietary source code, stored passwords, API tokens, etc. More advanced PoCs can let malicious actors cause even further damage by remotely executing code on the system and &lt;a href="https://twitter.com/campuscodi/status/1233400508435619845"&gt;planting backdoors&lt;/a&gt;, if they are able to get their hands on juicy bits of information.&lt;/p&gt;

&lt;p&gt;What’s more? “&lt;a href="https://www.bleepingcomputer.com/news/security/active-scans-for-apache-tomcat-ghostcat-vulnerability-detected-patch-now/"&gt;Mass scanning activity targeting this vulnerability has already begun&lt;/a&gt;,” according to Bad Packets and evident from Shodan, thereby prompting immediate attention and a speedy remediation of this issue.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--g2XtaJh5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://track.hubspot.com/__ptq.gif%3Fa%3D1958393%26k%3D14%26r%3Dhttps%253A%252F%252Fblog.sonatype.com%252Fnexus-intelligence-insights-whats-in-a-ghostcat-cve-2020-1938-apache-tomcat%26bu%3Dhttps%25253A%25252F%25252Fblog.sonatype.com%26bvt%3Drss" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--g2XtaJh5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://track.hubspot.com/__ptq.gif%3Fa%3D1958393%26k%3D14%26r%3Dhttps%253A%252F%252Fblog.sonatype.com%252Fnexus-intelligence-insights-whats-in-a-ghostcat-cve-2020-1938-apache-tomcat%26bu%3Dhttps%25253A%25252F%25252Fblog.sonatype.com%26bvt%3Drss" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://blog.sonatype.com/nexus-intelligence-insights-whats-in-a-ghostcat-cve-2020-1938-apache-tomcat"&gt;Read more at the Sonatype blog&lt;/a&gt;&lt;/p&gt;

</description>
      <category>vulnerabilities</category>
      <category>tomcat</category>
      <category>featured</category>
      <category>nexusintelligencei</category>
    </item>
  </channel>
</rss>
