SUSE SLES15 / openSUSE 15 Security Update : tomcat10 (SUSE-SU-2025:0033-1)

critical Nessus Plugin ID 213596

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:0033-1 advisory.

Update to Tomcat 10.1.34

- Fixed CVEs:
- CVE-2024-54677: DoS in examples web application (bsc#1234664)
- CVE-2024-50379: RCE due to TOCTOU issue in JSP compilation (bsc#1234663)
- CVE-2024-52317: Request/response mix-up with HTTP/2 (bsc#1233435)
- Catalina
- Add: Add option to serve resources from subpath only with WebDAV Servlet like with DefaultServlet. (michaelo)
- Fix: Add special handling for the protocols attribute of SSLHostConfig in storeconfig. (remm)
- Fix: 69442: Fix case sensitive check on content-type when parsing request parameters. (remm)
- Code: Refactor duplicate code for extracting media type and subtype from content-type into a single method. (markt)
- Fix: Compatibility of generated embedded code with components where constructors or property related methods throw a checked exception. (remm)
- Fix: The previous fix for inconsistent resource metadata during concurrent reads and writes was incomplete. (markt)
- Fix: #780: Fix content-range header length. Submitted by Chenjp. (remm)
- Fix: 69444: Ensure that the jakarta.servlet.error.message request attribute is set when an application defined error page is called. (markt)
- Fix: Avoid quotes for numeric values in the JSON generated by the status servlet. (remm)
- Add: Add strong ETag support for the WebDAV and default servlet, which can be enabled by using the useStrongETags init parameter with a value set to true. The ETag generated will be a SHA-1 checksum of the resource content.
(remm)
- Fix: Use client locale for directory listings. (remm)
- Fix: 69439: Improve the handling of multiple Cache-Control headers in the ExpiresFilter. Based on pull request #777 by Chenjp. (markt)
- Fix: 69447: Update the support for caching classes the web application class loader cannot find to take account of classes loaded from external repositories. Prior to this fix, these classes could be incorrectly marked as not found. (markt)
- Fix: 69466: Rework handling of HEAD requests. Headers explicitly set by users will not be removed and any header present in a HEAD request will also be present in the equivalent GET request. There may be some headers, as per RFC 9110, section 9.3.2, that are present in a GET request that are not present in the equivalent HEAD request. (markt)
- Fix: 69471: Log instances of CloseNowException caught by ApplicationDispatcher.invoke() at debug level rather than error level as they are very likely to have been caused by a client disconnection or similar I/O issue. (markt)
- Add: Add a test case for the fix for 69442. Also refactor references to application/x-www-form-urlencoded. Based on pull request #779 by Chenjp.
(markt)
- Fix: 69476: Catch possible ISE when trying to report PUT failure in the DefaultServlet. (remm)
- Add: Add support for RateLimit header fields for HTTP (draft) in the RateLimitFilter. Based on pull request #775 provided by Chenjp. (markt)
- Add: #787: Add regression tests for 69478. Pull request provided by Thomas Krisch. (markt)
- Fix: The default servlet now rejects HTTP range requests when two or more of the requested ranges overlap. Based on pull request #782 provided by Chenjp. (markt)
- Fix: Enhance Content-Range verification for partial PUT requests handled by the default servlet. Provided by Chenjp in pull request #778. (markt) + Fix: Harmonize DataSourceStore lookup in the global resources to optionally avoid the comp/env prefix which is usually not used there.
(remm) + Fix: As required by RFC 9110, the HTTP Range header will now only be processed for GET requests. Based on pull request #790 provided by Chenjp.
(markt) + Fix: Deprecate the useAcceptRanges initialisation parameter for the default servlet. It will be removed in Tomcat 12 onwards where it will effectively be hard coded to true. (markt) + Add: Add DataSource based property storage for the WebdavServlet. (remm)
- Coyote + Fix: Align encodedSolidusHandling with the Servlet specification. If the pass-through mode is used, any %25 sequences will now also be passed through to avoid errors and/or corruption when the application decodes the path. (markt)
- Jasper + Fix: Follow-up to the fix for 69381. Apply the optimisation for method lookup performance in expression language to an additional location.
(markt)
- Web applications + Fix: Documentation. Remove references to the ResourceParams element.
Support for ResourceParams was removed in Tomcat 5.5.x. (markt) + Fix: Documentation. 69477: Correct name of attribute for RemoteIPFilter.
The attribute is internalProxies rather than allowedInternalProxies. Pull request #786 (markt) + Fix: Examples. Fix broken links when Servlet Request Info example is called via a URL that includes a pathInfo component. (markt) + Fix: Examples. Expand the obfuscation of session cookie values in the request header example to JSON responses. (markt) + Add: Examples. Add the ability to delete session attributes in the servlet session example. (markt) + Add: Examples. Add a hard coded limit of 10 attributes per session for the servlet session example. (markt) + Add: Examples. Add the ability to delete session attributes and add a hard coded limit of 10 attributes per session for the JSP form authentication example. (markt) + Add: Examples. Limit the shopping cart example to only allow adding the pre-defined items to the cart. (markt) + Fix: Examples. Remove JSP calendar example. (markt)
- Other + Fix: 69465: Fix warnings during native image compilation using the Tomcat embedded JARs. (markt) + Update: Update Tomcat's fork of Commons DBCP to 2.13.0. (markt) + Update: Update EasyMock to 5.5.0. (markt) + Update: Update Checkstyle to 10.20.2. (markt) + Update: Update BND to 7.1.0. (markt) + Add: Improvements to French translations. (remm) + Add: Improvements to Korean translations. (markt) + Add: Improvements to Chinese translations. (markt) + Add: Improvements to Japanese translations by tak7iji. (markt)

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1233435

https://bugzilla.suse.com/1234663

https://bugzilla.suse.com/1234664

http://www.nessus.org/u?8ea84f84

https://www.suse.com/security/cve/CVE-2024-50379

https://www.suse.com/security/cve/CVE-2024-52317

https://www.suse.com/security/cve/CVE-2024-54677

Plugin Details

Severity: Critical

ID: 213596

File Name: suse_SU-2025-0033-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 1/9/2025

Updated: 1/9/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.4

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2024-52317

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2024-50379

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:tomcat10-el-5_0-api, p-cpe:/a:novell:suse_linux:tomcat10, p-cpe:/a:novell:suse_linux:tomcat10-webapps, p-cpe:/a:novell:suse_linux:tomcat10-admin-webapps, p-cpe:/a:novell:suse_linux:tomcat10-servlet-6_0-api, p-cpe:/a:novell:suse_linux:tomcat10-jsp-3_1-api, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:tomcat10-lib

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/7/2025

Vulnerability Publication Date: 10/9/2024

Reference Information

CVE: CVE-2024-50379, CVE-2024-52317, CVE-2024-54677

IAVA: 2024-A-0754-S, 2024-A-0822

SuSE: SUSE-SU-2025:0033-1