跳转到帖子

Apache Tomcat: Important: Remote Code Execution via write enabled Default Servlet (CVE-2024-50379)

recommended_posts

发布于
  • Members

Apache Tomcat: Important: Remote Code Execution via write enabled Default Servlet (CVE-2024-50379)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
12/18/2024
Created
12/19/2024
Added
12/18/2024
Modified
12/23/2024

Description

Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration). This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.

Solution(s)

  • apache-tomcat-upgrade-10_1_34
  • apache-tomcat-upgrade-11_0_2
  • apache-tomcat-upgrade-9_0_98

References

  • https://attackerkb.com/topics/cve-2024-50379
  • CVE - 2024-50379
  • http://tomcat.apache.org/security-10.html
  • http://tomcat.apache.org/security-11.html
  • http://tomcat.apache.org/security-9.html
  • 查看数 701
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…