Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-52317

Опубликовано: 18 нояб. 2024
Источник: debian
EPSS Низкий

Описание

Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat10fixed10.1.31-1package
tomcat10not-affectedbookwormpackage
tomcat9not-affectedpackage

Примечания

  • https://lists.apache.org/thread/ty376mrxy1mmxtw3ogo53nc9l3co3dfs

  • https://github.com/apache/tomcat/commit/146f94f87ea398fb592c7a20a5ccbef95e9dd72b (10.1.31)

  • https://github.com/apache/tomcat/commit/47307ee27abcdea2ee40e33897aca760083de46a (9.0.96)

EPSS

Процентиль: 88%
0.03805
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
7 месяцев назад

Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.

CVSS3: 6.5
redhat
7 месяцев назад

Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.

CVSS3: 6.5
nvd
7 месяцев назад

Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.

CVSS3: 6.5
github
7 месяцев назад

Apache Tomcat Request and/or response mix-up

CVSS3: 6.5
fstec
7 месяцев назад

Уязвимость сервера приложений Apache Tomcat, связанная с недостаточно стойким шифрованием данных, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 88%
0.03805
Низкий