Apache Tomcat 9.0.0-M1 < 9.0.98 Multiple Vulnerabilities

critical Web App Scanning Plugin ID 114548

Synopsis

Apache Tomcat 9.0.0-M1 < 9.0.98 Multiple Vulnerabilities

Description

The version of Apache Tomcat installed on the remote host 9.0.0-M1 to 9.0.97, 10.1.0-M1 to 10.1.33 or 11.0.0-M1 to 11.0.1. It is, therefore, affected by multiple vulnerabilities :

- The previous mitigation for CVE-2024-50379 was incomplete. In addition to upgrading to 11.0.2 or later, users running Tomcat on a case insensitive file system with the default servlet write enabled may need additional configuration depending on the version of Java being used. (CVE-2024-56337)

- Numerous examples in the examples web application did not place limits on uploaded data enabling an OutOfMemoryError to be triggered causing a denial of service. (CVE-2024-54677)

- If the default servlet is write enabled (readonly initialisation parameter set to the non-default value of false) for a case insensitive file system, concurrent read and upload under load of the same file can bypass Tomcat's case sensitivity checks and cause an uploaded file to be treated as a JSP leading to remote code execution. (CVE-2024-50379)

Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Apache Tomcat version 9.0.98 or later.

See Also

https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.98

Plugin Details

Severity: Critical

ID: 114548

Type: remote

Published: 12/23/2024

Updated: 12/23/2024

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Critical

Score: 9.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2024-50379

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2024-50379

Vulnerability Information

CPE: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/9/2024

Vulnerability Publication Date: 12/9/2024

Reference Information

CVE: CVE-2024-50379, CVE-2024-54677, CVE-2024-56337