VID |
210249 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of Tomcat installed on the remote host is prior to 10.0.0-M5. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_11.0.0-m5_security-11.
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
* References: https://github.com/apache/tomcat/commit/d53d8e7f77042cc32a3b98f589496a1ef5088e38 https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.0-M5
* Platforms Affected: Apache Tomcat Server versions 11.0.0 prior to 11.0.0-M5 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (11.0.0-M5 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2023-28709 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|