2023天天弄国产大片_男人的天堂v在线播放_精品久久这里_久久久无码国产精精品免费国国产欧美日本韩高清视频一区二区三区免费式_成全视频免费观看在线下载

Service Notices

All Notices > Security Notices > Apache Tomcat Remote Code Execution Vulnerability (CVE-2024-50379)

Apache Tomcat Remote Code Execution Vulnerability (CVE-2024-50379)

Dec 19, 2024 GMT+08:00

I. Overview

Recently, Apache Tomcat issued a security notice regarding a remote code execution vulnerability (CVE-2024-50379) in certain versions. This vulnerability stems from a flaw in verifying file paths. If the default servlet is write enabled (readonly initialisation parameter set to the non-default value of false) for a case insensitive file system, concurrent read and upload under load of the same file can bypass Tomcat's case sensitivity checks and cause an uploaded file to be treated as a JSP leading to remote code execution.

Apache Tomcat is a popular Java web application server. If you are an Apache Tomcat user, check your versions and implement timely security hardening.

Reference:

https://lists.apache.org/thread/y6lj6q1xnp822g6ro70tn19sgtjmr80r

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Products

Affected versions:

Apache Tomcat 11.0.0-M1 ~ 11.0.1

Apache Tomcat 10.1.0-M1 ~ 10.1.33

Apache Tomcat 9.0.0.M1 ~ 9.0.97

Secure versions:

Apache Tomcat 11.0.2

Apache Tomcat 10.1.34

Apache Tomcat 9.0.98

IV. Vulnerability Handling

This vulnerability has been fixed in later official versions. If your service version falls into the affected range, upgrade it to a latest secure version.

Apache Tomcat 11: https://tomcat.apache.org/download-11.cgi

Apache Tomcat 10: https://tomcat.apache.org/download-10.cgi

Apache Tomcat 9: https://tomcat.apache.org/download-90.cgi

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.