Korean
<< Back
VID 210287
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of Tomcat installed on the remote host is prior to 9.0.98. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_9.0.98_security-9 advisory.

- If the default servlet is write enabled (readonly initialisation parameter set to the non-default value of false) for a case insensitive file system, concurrent read and upload under load of the same file can bypass Tomcat's case sensitivity checks and cause an uploaded file to be treated as a JSP leading to remote code execution. (CVE-2024-50379)
- Numerous examples in the examples web application did not place limits on uploaded data enabling an OutOfMemoryError to be triggered causing a denial of service. (CVE-2024-54677)

* References:
https://github.com/apache/tomcat/commit/1d88dd3ffaed76188dd4ee32ce77709ce6e153cd
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.98

* Platforms Affected:
Apache Tomcat Server versions 9.0.x prior to 9.0.98
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (9.0.98 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2024-50379,CVE-2024-54677 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)