Korean
<< Back
VID 210288
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of Tomcat installed on the remote host is prior to 10.1.34. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_10.1.34_security-10 advisory.

- If the default servlet is write enabled (readonly initialisation parameter set to the non-default value of false) for a case insensitive file system, concurrent read and upload under load of the same file can bypass Tomcat's case sensitivity checks and cause an uploaded file to be treated as a JSP leading to remote code execution. (CVE-2024-50379)
- Numerous examples in the examples web application did not place limits on uploaded data enabling an OutOfMemoryError to be triggered causing a denial of service. (CVE-2024-54677)

* References:
https://github.com/apache/tomcat/commit/f57a9d9847c1038be61f5818d73b8be907c460d4
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.34

* Platforms Affected:
Apache Tomcat Server versions 10.1.x prior to 10.1.34
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (10.1.34 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2024-50379,CVE-2024-54677 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)