| VID |
210287 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The version of Tomcat installed on the remote host is prior to 9.0.98. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_9.0.98_security-9 advisory.
- If the default servlet is write enabled (readonly initialisation parameter set to the non-default value of false) for a case insensitive file system, concurrent read and upload under load of the same file can bypass Tomcat's case sensitivity checks and cause an uploaded file to be treated as a JSP leading to remote code execution. (CVE-2024-50379) - Numerous examples in the examples web application did not place limits on uploaded data enabling an OutOfMemoryError to be triggered causing a denial of service. (CVE-2024-54677)
* References: https://github.com/apache/tomcat/commit/1d88dd3ffaed76188dd4ee32ce77709ce6e153cd https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.98
* Platforms Affected: Apache Tomcat Server versions 9.0.x prior to 9.0.98 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Apache Tomcat Server (9.0.98 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
| Related URL |
CVE-2024-50379,CVE-2024-54677 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|