Korean
<< Back
VID 210289
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of Tomcat installed on the remote host is prior to 11.0.2. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_11.0.2_security-11 advisory.

- If the default servlet is write enabled (readonly initialisation parameter set to the non-default value of false) for a case insensitive file system, concurrent read and upload under load of the same file can bypass Tomcat's case sensitivity checks and cause an uploaded file to be treated as a JSP leading to remote code execution. (CVE-2024-50379)
- Numerous examples in the examples web application did not place limits on uploaded data enabling an OutOfMemoryError to be triggered causing a denial of service. (CVE-2024-54677)

* References:
https://github.com/apache/tomcat/commit/4f0236606961176257b883213e1621b1859ed746
https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.2

* Platforms Affected:
Apache Tomcat Server versions 11.0.x prior to 11.0.2
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (11.0.2 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2024-50379,CVE-2024-54677 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)