Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-50379

Опубликовано: 17 дек. 2024
Источник: redhat
CVSS3: 8.1
EPSS Высокий

Описание

Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration). This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.

A flaw was found in Tomcat. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.

Отчет

This flaw can only be exploited when the readonly initialization parameter value is set to false, when running on case insensitive file systems and when the application is under load, specifically when read and upload operations are performed on the same file simultaneously. The default readonly initialization parameter value is true and not vulnerable to this issue. Due to the conditions for this issue to be exploited, especially because it requires unlikely configurations, this flaw has been rated with a Moderate severity. The Tomcat package as shipped in Red Hat Enterprise Linux 6 and 7 is not affected by this vulnerability because the vulnerable code was introduced in a newer Tomcat version. Red Hat Satellite is not directed impacted by this issue as it does not include the affected Tomcat package. However, Tomcat is consumed by Candlepin, a component of Satellite. Red Hat Satellite users are advised to check the impact state of Red Hat Enterprise Linux as any necessary fixes will be distributed through the platform.

Меры по смягчению последствий

Consider setting the readonly initialization parameter value to true (the default value), if that is not possible, do not use a case-insensitive file system.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10tomcatAffected
Red Hat Enterprise Linux 6tomcat6Not affected
Red Hat Enterprise Linux 7tomcatNot affected
Red Hat Enterprise Linux 8pki-deps:10.6/pki-servlet-engineWill not fix
Red Hat Enterprise Linux 9pki-servlet-engineAffected
Red Hat Enterprise Linux 8tomcatFixedRHSA-2025:368308.04.2025
Red Hat Enterprise Linux 8.8 Extended Update SupporttomcatFixedRHSA-2025:368408.04.2025
Red Hat Enterprise Linux 9tomcatFixedRHSA-2025:364507.04.2025
Red Hat Enterprise Linux 9.2 Extended Update Supportpki-servlet-engineFixedRHSA-2025:192027.02.2025
Red Hat Enterprise Linux 9.2 Extended Update SupporttomcatFixedRHSA-2025:364607.04.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-367
https://bugzilla.redhat.com/show_bug.cgi?id=2332817tomcat: RCE due to TOCTOU issue in JSP compilation

EPSS

Процентиль: 100%
0.89324
Высокий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
6 месяцев назад

Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration). This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.

CVSS3: 9.8
nvd
6 месяцев назад

Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration). This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.

CVSS3: 9.8
debian
6 месяцев назад

Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during ...

CVSS3: 9.8
github
6 месяцев назад

Apache Tomcat Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability

CVSS3: 9.8
fstec
6 месяцев назад

Уязвимость сервлета DefaultServlet сервера приложений Apache Tomcat, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.89324
Высокий

8.1 High

CVSS3