CVE-2024-50379 Apache Tomcat - RCE via write-enabled default servlet
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected:
Apache Tomcat 11.0.0-M1 to 11.0.1
Apache Tomcat 10.1.0-M1 to 10.1.33
Apache Tomcat 9.0.0.M1 to 9.0.97
Description:
If the default servlet is write enabled (readonly initialisation
parameter set to the non-default value of false) for a case insensitive
file system, concurrent read and upload under load of the same file can
bypass Tomcat's case sensitivity checks and cause an uploaded file to be
treated as a JSP leading to remote code execution.
Mitigation:
Users of the affected versions should apply one of the following
mitigations:
- Upgrade to Apache Tomcat 11.0.2 or later
- Upgrade to Apache Tomcat 10.1.34 or later
- Upgrade to Apache Tomcat 9.0.98 or later
Credit:
This vulnerability identified by Nacl, WHOAMI, Yemoli and Ruozhi.
History:
2024-12-17 Original advisory
References:
[1] https://tomcat.apache.org/security-11.html
[2] https://tomcat.apache.org/security-10.html
[3] https://tomcat.apache.org/security-9.html