Author: markt Date: Mon Feb 20 16:36:44 2023 New Revision: 1907777 URL: http://svn.apache.org/viewvc?rev=1907777&view=rev Log: Update site for CVE-2023-24998
Modified: tomcat/site/trunk/docs/security-10.html tomcat/site/trunk/docs/security-11.html tomcat/site/trunk/docs/security-8.html tomcat/site/trunk/docs/security-9.html tomcat/site/trunk/xdocs/security-10.xml tomcat/site/trunk/xdocs/security-11.xml tomcat/site/trunk/xdocs/security-8.xml tomcat/site/trunk/xdocs/security-9.xml Modified: tomcat/site/trunk/docs/security-10.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-10.html?rev=1907777&r1=1907776&r2=1907777&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-10.html (original) +++ tomcat/site/trunk/docs/security-10.html Mon Feb 20 16:36:44 2023 @@ -42,26 +42,27 @@ </p> </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text"> - <ul><li><a href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in Apache Tomcat 10.1.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in Apache Tomcat 10.1.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in Apache Tomcat 10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in Apache Tomcat 10.1.0-M14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat 10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomc at_10.0.12">Fixed in Apache Tomcat 10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat 10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in Apache Tomcat 10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 10.0.0-M5</a> </li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> - </div><h3 id="Fixed_in_Apache_Tomcat_10.0.27"><span class="pull-right">2022-10-10</span> Fixed in Apache Tomcat 10.0.27</h3><div class="text"> + <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache Tomcat 10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in Apache Tomcat 10.1.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in Apache Tomcat 10.1.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in Apache Tomcat 10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in Apache Tomcat 10.1.0-M14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1. 0-M10">Fixed in Apache Tomcat 10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat 10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in Apache Tomcat 10.0.0-M6</a></li>< li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + </div><h3 id="Fixed_in_Apache_Tomcat_10.1.5"><span class="pull-right">2023-01-13</span> Fixed in Apache Tomcat 10.1.5</h3><div class="text"> - <p><strong>Low: Apache Tomcat request smuggling</strong> - <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42252" rel="nofollow">CVE-2022-42252</a></p> + <p><strong>Important: Apache Tomcat denial of service</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24998" rel="nofollow">CVE-2023-24998</a></p> - <p>If Tomcat was configured to ignore invalid HTTP headers via setting - <code>rejectIllegalHeader</code> to <code>false</code> (not the default), - Tomcat did not reject a request containing an invalid - <code>Content-Length</code> header making a request smuggling attack - possible if Tomcat was located behind a reverse proxy that also failed to - reject the request with the invalid header.</p> + <p>Apache Tomcat uses a packaged renamed copy of Apache Commons FileUpload + to provide the file upload functionality defined in the Jakarta Servlet + specification. Apache Tomcat was, therefore, also vulnerable to the + Apache Commons FileUpload vulnerability <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24998" rel="nofollow">CVE-2023-24998</a> as + there was no limit to the number of request parts processed. This + resulted in the possibility of an attacker triggering a DoS with a + malicious upload or series of uploads.</p> <p>This was fixed with commit - <a href="https://github.com/apache/tomcat/commit/0d089a15047faf9cb3c82f80f4d28febd4798920">0d089a15</a>.</p> + <a href="https://github.com/apache/tomcat/commit/8a2285f13affa961cc65595aad999db5efae45ce">8a2285f1</a>.</p> - <p>This issue was reported to the Apache Tomcat Security team on 29 - September 2022. The issue was made public on 31 October 2022.</p> + <p>This issue was reported to the Apache Tomcat Security team on 11 + December 2022. The issue was made public on 20 February 2023.</p> - <p>Affects: 10.0.0-M1 to 10.0.26</p> + <p>Affects: 10.1.0-M1 to 10.1.4</p> </div><h3 id="Fixed_in_Apache_Tomcat_10.1.2"><span class="pull-right">2022-11-14</span> Fixed in Apache Tomcat 10.1.2</h3><div class="text"> @@ -102,6 +103,26 @@ <p>Affects: 10.1.0-M1 to 10.1.0</p> + </div><h3 id="Fixed_in_Apache_Tomcat_10.0.27"><span class="pull-right">2022-10-10</span> Fixed in Apache Tomcat 10.0.27</h3><div class="text"> + + <p><strong>Low: Apache Tomcat request smuggling</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42252" rel="nofollow">CVE-2022-42252</a></p> + + <p>If Tomcat was configured to ignore invalid HTTP headers via setting + <code>rejectIllegalHeader</code> to <code>false</code> (not the default), + Tomcat did not reject a request containing an invalid + <code>Content-Length</code> header making a request smuggling attack + possible if Tomcat was located behind a reverse proxy that also failed to + reject the request with the invalid header.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/0d089a15047faf9cb3c82f80f4d28febd4798920">0d089a15</a>.</p> + + <p>This issue was reported to the Apache Tomcat Security team on 29 + September 2022. The issue was made public on 31 October 2022.</p> + + <p>Affects: 10.0.0-M1 to 10.0.26</p> + </div><h3 id="Fixed_in_Apache_Tomcat_10.0.23"><span class="pull-right">2022-07-26</span> Fixed in Apache Tomcat 10.0.23</h3><div class="text"> <p><strong>Low: Apache Tomcat XSS in examples web application</strong> Modified: tomcat/site/trunk/docs/security-11.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-11.html?rev=1907777&r1=1907776&r2=1907777&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-11.html (original) +++ tomcat/site/trunk/docs/security-11.html Mon Feb 20 16:36:44 2023 @@ -36,9 +36,34 @@ </p> </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text"> - <p>There are currently no known public vulnerabilities in Apache Tomcat - 11.x.</p> - <ul></ul> + <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in Apache Tomcat 11.0.0-M3</a></li></ul> + </div><h3 id="Fixed_in_Apache_Tomcat_11.0.0-M3"><span class="pull-right">TBD</span> Fixed in Apache Tomcat 11.0.0-M3</h3><div class="text"> + + <p><i>Note: The issue below was fixed in Apache Tomcat 11.0.0-M2 but the + release vote for the 11.0.0-M2 release candidate did not pass. Therefore, + although users must download 11.0.0-M3 to obtain a version that includes + a fix for these issues, version 11.0.0-M2 is not included in the list of + affected versions.</i></p> + + <p><strong>Important: Apache Tomcat denial of service</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24998" rel="nofollow">CVE-2023-24998</a></p> + + <p>Apache Tomcat uses a packaged renamed copy of Apache Commons FileUpload + to provide the file upload functionality defined in the Jakarta Servlet + specification. Apache Tomcat was, therefore, also vulnerable to the + Apache Commons FileUpload vulnerability <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24998" rel="nofollow">CVE-2023-24998</a> as + there was no limit to the number of request parts processed. This + resulted in the possibility of an attacker triggering a DoS with a + malicious upload or series of uploads.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/063e2e81ede50c287f737cc8e2915ce7217e886e">063e2e81</a>.</p> + + <p>This issue was reported to the Apache Tomcat Security team on 11 + December 2022. The issue was made public on 20 February 2023.</p> + + <p>Affects: 11.0.0-M1</p> + </div></div></div></div></main><footer id="footer"> Copyright © 1999-2023, The Apache Software Foundation <br> Modified: tomcat/site/trunk/docs/security-8.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1907777&r1=1907776&r2=1907777&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-8.html (original) +++ tomcat/site/trunk/docs/security-8.html Mon Feb 20 16:36:44 2023 @@ -42,7 +42,28 @@ </p> </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text"> - <ul><li><a href="#Fixed_in_Apache_Tomcat_8.5.84">Fixed in Apache Tomcat 8.5.84</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.83">Fixed in Apache Tomcat 8.5.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.82">Fixed in Apache Tomcat 8.5.82</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.79">Fixed in Apache Tomcat 8.5.79</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.78">Fixed in Apache Tomcat 8.5.78</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.76">Fixed in Apache Tomcat 8.5.76</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.75">Fixed in Apache Tomcat 8.5.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.72">Fixed in Apache Tomcat 8.5.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.68">Fixed in Apache Tomcat 8.5.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.66">Fixed in Apache Tomcat 8.5.66</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.65">Fixed in Apache Tomcat 8.5.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.64">Fixed in Apache Tomcat 8.5.64</ a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.63">Fixed in Apache Tomcat 8.5.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.60">Fixed in Apache Tomcat 8.5.60</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.58">Fixed in Apache Tomcat 8.5.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.57">Fixed in Apache Tomcat 8.5.57</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.56">Fixed in Apache Tomcat 8.5.56</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.55">Fixed in Apache Tomcat 8.5.55</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.51">Fixed in Apache Tomcat 8.5.51</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.50">Fixed in Apache Tomcat 8.5.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.49">Fixed in Apache Tomcat 8.5.49</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.41">Fixed in Apache Tomcat 8.5.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.40">Fixed in Apache Tomcat 8.5.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.38">Fixed in Apache Tomcat 8.5.38</a ></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.34">Fixed in Apache Tomcat >8.5.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.53">Fixed in Apache >Tomcat 8.0.53</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.32">Fixed in >Apache Tomcat 8.5.32</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.0.52">Fixed in Apache Tomcat >8.0.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.31">Fixed in Apache >Tomcat 8.5.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.50">Fixed in >Apache Tomcat 8.0.50</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.5.28">Fixed in Apache Tomcat >8.5.28</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.48">Fixed in Apache >Tomcat 8.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.24">Fixed in >Apache Tomcat 8.5.24</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.0.47">Fixed in Apache Tomcat >8.0.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.23">Fixed in Apache >Tomcat 8.5.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.45">Fixed in >Apache Tomcat 8.0.45</a> </li><li><a href="#Fixed_in_Apache_Tomcat_8.5.16">Fixed in Apache Tomcat 8.5.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.44">Fixed in Apache Tomcat 8.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.15">Fixed in Apache Tomcat 8.5.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.43">Fixed in Apache Tomcat 8.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.13">Fixed in Apache Tomcat 8.5.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.42">Fixed in Apache Tomcat 8.0.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.12">Fixed in Apache Tomcat 8.5.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.41">Fixed in Apache Tomcat 8.0.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.11">Fixed in Apache Tomcat 8.5.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.9">Fixed in Apache Tomcat 8.5.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.39">Fixed in Apache Tomcat 8.0.39</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.8">Fixed in Apache Tomcat 8.5.8</a></li> <li><a href="#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37">Fixed in Apache Tomcat 8.5.5 and 8.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.3_and_8.0.36">Fixed in Apache Tomcat 8.5.3 and 8.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.32">Fixed in Apache Tomcat 8.0.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.30">Fixed in Apache Tomcat 8.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.27">Fixed in Apache Tomcat 8.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.17">Fixed in Apache Tomcat 8.0.17</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.9">Fixed in Apache Tomcat 8.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.8">Fixed in Apache Tomcat 8.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.5">Fixed in Apache Tomcat 8.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.3">Fixed in Apache Tomcat 8.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-RC10">Fixed in Apache Tomcat 8.0.0-RC10</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-R C3">Fixed in Apache Tomcat 8.0.0-RC3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + <ul><li><a href="#Fixed_in_Apache_Tomcat_8.5.85">Fixed in Apache Tomcat 8.5.85</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.84">Fixed in Apache Tomcat 8.5.84</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.83">Fixed in Apache Tomcat 8.5.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.82">Fixed in Apache Tomcat 8.5.82</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.79">Fixed in Apache Tomcat 8.5.79</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.78">Fixed in Apache Tomcat 8.5.78</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.76">Fixed in Apache Tomcat 8.5.76</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.75">Fixed in Apache Tomcat 8.5.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.72">Fixed in Apache Tomcat 8.5.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.68">Fixed in Apache Tomcat 8.5.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.66">Fixed in Apache Tomcat 8.5.66</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.65">Fixed in Apache Tomcat 8.5.65</ a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.64">Fixed in Apache Tomcat 8.5.64</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.63">Fixed in Apache Tomcat 8.5.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.60">Fixed in Apache Tomcat 8.5.60</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.58">Fixed in Apache Tomcat 8.5.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.57">Fixed in Apache Tomcat 8.5.57</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.56">Fixed in Apache Tomcat 8.5.56</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.55">Fixed in Apache Tomcat 8.5.55</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.51">Fixed in Apache Tomcat 8.5.51</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.50">Fixed in Apache Tomcat 8.5.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.49">Fixed in Apache Tomcat 8.5.49</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.41">Fixed in Apache Tomcat 8.5.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.40">Fixed in Apache Tomcat 8.5.40</a ></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.38">Fixed in Apache Tomcat >8.5.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.34">Fixed in Apache >Tomcat 8.5.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.53">Fixed in >Apache Tomcat 8.0.53</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.5.32">Fixed in Apache Tomcat >8.5.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.52">Fixed in Apache >Tomcat 8.0.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.31">Fixed in >Apache Tomcat 8.5.31</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.0.50">Fixed in Apache Tomcat >8.0.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.28">Fixed in Apache >Tomcat 8.5.28</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.48">Fixed in >Apache Tomcat 8.0.48</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.5.24">Fixed in Apache Tomcat >8.5.24</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.47">Fixed in Apache >Tomcat 8.0.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.23">Fixed in >Apache Tomcat 8.5.23</a> </li><li><a href="#Fixed_in_Apache_Tomcat_8.0.45">Fixed in Apache Tomcat 8.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.16">Fixed in Apache Tomcat 8.5.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.44">Fixed in Apache Tomcat 8.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.15">Fixed in Apache Tomcat 8.5.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.43">Fixed in Apache Tomcat 8.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.13">Fixed in Apache Tomcat 8.5.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.42">Fixed in Apache Tomcat 8.0.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.12">Fixed in Apache Tomcat 8.5.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.41">Fixed in Apache Tomcat 8.0.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.11">Fixed in Apache Tomcat 8.5.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.9">Fixed in Apache Tomcat 8.5.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.39">Fixed in Apache Tomcat 8.0.39</a></l i><li><a href="#Fixed_in_Apache_Tomcat_8.5.8">Fixed in Apache Tomcat 8.5.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37">Fixed in Apache Tomcat 8.5.5 and 8.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.3_and_8.0.36">Fixed in Apache Tomcat 8.5.3 and 8.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.32">Fixed in Apache Tomcat 8.0.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.30">Fixed in Apache Tomcat 8.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.27">Fixed in Apache Tomcat 8.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.17">Fixed in Apache Tomcat 8.0.17</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.9">Fixed in Apache Tomcat 8.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.8">Fixed in Apache Tomcat 8.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.5">Fixed in Apache Tomcat 8.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.3">Fixed in Apache Tomcat 8.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-RC10">Fix ed in Apache Tomcat 8.0.0-RC10</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-RC3">Fixed in Apache Tomcat 8.0.0-RC3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + </div><h3 id="Fixed_in_Apache_Tomcat_8.5.85"><span class="pull-right">2023-01-19</span> Fixed in Apache Tomcat 8.5.85</h3><div class="text"> + + <p><strong>Important: Apache Tomcat denial of service</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24998" rel="nofollow">CVE-2023-24998</a></p> + + <p>Apache Tomcat uses a packaged renamed copy of Apache Commons FileUpload + to provide the file upload functionality defined in the Jakarta Servlet + specification. Apache Tomcat was, therefore, also vulnerable to the + Apache Commons FileUpload vulnerability <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24998" rel="nofollow">CVE-2023-24998</a> as + there was no limit to the number of request parts processed. This + resulted in the possibility of an attacker triggering a DoS with a + malicious upload or series of uploads.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/9ca96c8c1eba86c0aaa2e6be581ba2a7d4d4ae6e">9ca96c8c</a>.</p> + + <p>This issue was reported to the Apache Tomcat Security team on 11 + December 2022. The issue was made public on 20 February 2023.</p> + + <p>Affects: 8.5.0 to 8.5.84</p> + </div><h3 id="Fixed_in_Apache_Tomcat_8.5.84"><span class="pull-right">2022-11-21</span> Fixed in Apache Tomcat 8.5.84</h3><div class="text"> <p><strong>Low: Apache Tomcat JsonErrorReportValve injection</strong> Modified: tomcat/site/trunk/docs/security-9.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1907777&r1=1907776&r2=1907777&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-9.html (original) +++ tomcat/site/trunk/docs/security-9.html Mon Feb 20 16:36:44 2023 @@ -36,7 +36,28 @@ </p> </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text"> - <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache Tomcat 9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache Tomcat 9.0.43</ a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache Tomcat 9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat 9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache Tomcat 9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat 9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache Tomcat 9.0.16</a ></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache Tomcat >9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache >Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in >Apache Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed >in Apache Tomcat 9.0.8</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache Tomcat >9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache >Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in >Apache Tomcat 9.0.1</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat >9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in >Apache Tomcat 9.0.0.M21</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat >9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in >Apache Tomcat 9.0.0.M18</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat 9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat 9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat 9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in Apache Tomcat 9.0.0.M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in Apache Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache Tomcat 9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache Tomcat 9.0.44</ a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache Tomcat 9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat 9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache Tomcat 9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat 9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache Tomcat 9.0.19</a ></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache Tomcat >9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache >Tomcat 9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in >Apache Tomcat 9.0.10</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache Tomcat >9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in Apache >Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in >Apache Tomcat 9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed >in Apache Tomcat 9.0.2</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache Tomcat >9.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache >Tomcat 9.0.0.M22</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat >9.0.0.M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in >Apache Tomcat 9.0.0.M19</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache Tomcat 9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat 9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat 9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat 9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in Apache Tomcat 9.0.0.M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + </div><h3 id="Fixed_in_Apache_Tomcat_9.0.71"><span class="pull-right">2023-01-13</span> Fixed in Apache Tomcat 9.0.71</h3><div class="text"> + + <p><strong>Important: Apache Tomcat denial of service</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24998" rel="nofollow">CVE-2023-24998</a></p> + + <p>Apache Tomcat uses a packaged renamed copy of Apache Commons FileUpload + to provide the file upload functionality defined in the Jakarta Servlet + specification. Apache Tomcat was, therefore, also vulnerable to the + Apache Commons FileUpload vulnerability <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24998" rel="nofollow">CVE-2023-24998</a> as + there was no limit to the number of request parts processed. This + resulted in the possibility of an attacker triggering a DoS with a + malicious upload or series of uploads.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/cf77cc545de0488fb89e24294151504a7432df74">cf77cc54</a>.</p> + + <p>This issue was reported to the Apache Tomcat Security team on 11 + December 2022. The issue was made public on 20 February 2023.</p> + + <p>Affects: 9.0.0-M1 to 9.0.70</p> + </div><h3 id="Fixed_in_Apache_Tomcat_9.0.69"><span class="pull-right">2022-11-14</span> Fixed in Apache Tomcat 9.0.69</h3><div class="text"> <p><strong>Low: Apache Tomcat JsonErrorReportValve injection</strong> Modified: tomcat/site/trunk/xdocs/security-10.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-10.xml?rev=1907777&r1=1907776&r2=1907777&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-10.xml (original) +++ tomcat/site/trunk/xdocs/security-10.xml Mon Feb 20 16:36:44 2023 @@ -56,25 +56,26 @@ <toc/> </section> - <section name="Fixed in Apache Tomcat 10.0.27" rtext="2022-10-10"> + <section name="Fixed in Apache Tomcat 10.1.5" rtext="2023-01-13"> - <p><strong>Low: Apache Tomcat request smuggling</strong> - <cve>CVE-2022-42252</cve></p> + <p><strong>Important: Apache Tomcat denial of service</strong> + <cve>CVE-2023-24998</cve></p> - <p>If Tomcat was configured to ignore invalid HTTP headers via setting - <code>rejectIllegalHeader</code> to <code>false</code> (not the default), - Tomcat did not reject a request containing an invalid - <code>Content-Length</code> header making a request smuggling attack - possible if Tomcat was located behind a reverse proxy that also failed to - reject the request with the invalid header.</p> + <p>Apache Tomcat uses a packaged renamed copy of Apache Commons FileUpload + to provide the file upload functionality defined in the Jakarta Servlet + specification. Apache Tomcat was, therefore, also vulnerable to the + Apache Commons FileUpload vulnerability <cve>CVE-2023-24998</cve> as + there was no limit to the number of request parts processed. This + resulted in the possibility of an attacker triggering a DoS with a + malicious upload or series of uploads.</p> <p>This was fixed with commit - <hashlink hash="0d089a15047faf9cb3c82f80f4d28febd4798920"/>.</p> + <hashlink hash="8a2285f13affa961cc65595aad999db5efae45ce"/>.</p> - <p>This issue was reported to the Apache Tomcat Security team on 29 - September 2022. The issue was made public on 31 October 2022.</p> + <p>This issue was reported to the Apache Tomcat Security team on 11 + December 2022. The issue was made public on 20 February 2023.</p> - <p>Affects: 10.0.0-M1 to 10.0.26</p> + <p>Affects: 10.1.0-M1 to 10.1.4</p> </section> @@ -121,6 +122,28 @@ </section> + <section name="Fixed in Apache Tomcat 10.0.27" rtext="2022-10-10"> + + <p><strong>Low: Apache Tomcat request smuggling</strong> + <cve>CVE-2022-42252</cve></p> + + <p>If Tomcat was configured to ignore invalid HTTP headers via setting + <code>rejectIllegalHeader</code> to <code>false</code> (not the default), + Tomcat did not reject a request containing an invalid + <code>Content-Length</code> header making a request smuggling attack + possible if Tomcat was located behind a reverse proxy that also failed to + reject the request with the invalid header.</p> + + <p>This was fixed with commit + <hashlink hash="0d089a15047faf9cb3c82f80f4d28febd4798920"/>.</p> + + <p>This issue was reported to the Apache Tomcat Security team on 29 + September 2022. The issue was made public on 31 October 2022.</p> + + <p>Affects: 10.0.0-M1 to 10.0.26</p> + + </section> + <section name="Fixed in Apache Tomcat 10.0.23" rtext="2022-07-26"> <p><strong>Low: Apache Tomcat XSS in examples web application</strong> Modified: tomcat/site/trunk/xdocs/security-11.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-11.xml?rev=1907777&r1=1907776&r2=1907777&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-11.xml (original) +++ tomcat/site/trunk/xdocs/security-11.xml Mon Feb 20 16:36:44 2023 @@ -47,11 +47,38 @@ </section> <section name="Table of Contents"> - <p>There are currently no known public vulnerabilities in Apache Tomcat - 11.x.</p> <toc/> </section> + <section name="Fixed in Apache Tomcat 11.0.0-M3" rtext="TBD"> + + <p><i>Note: The issue below was fixed in Apache Tomcat 11.0.0-M2 but the + release vote for the 11.0.0-M2 release candidate did not pass. Therefore, + although users must download 11.0.0-M3 to obtain a version that includes + a fix for these issues, version 11.0.0-M2 is not included in the list of + affected versions.</i></p> + + <p><strong>Important: Apache Tomcat denial of service</strong> + <cve>CVE-2023-24998</cve></p> + + <p>Apache Tomcat uses a packaged renamed copy of Apache Commons FileUpload + to provide the file upload functionality defined in the Jakarta Servlet + specification. Apache Tomcat was, therefore, also vulnerable to the + Apache Commons FileUpload vulnerability <cve>CVE-2023-24998</cve> as + there was no limit to the number of request parts processed. This + resulted in the possibility of an attacker triggering a DoS with a + malicious upload or series of uploads.</p> + + <p>This was fixed with commit + <hashlink hash="063e2e81ede50c287f737cc8e2915ce7217e886e"/>.</p> + + <p>This issue was reported to the Apache Tomcat Security team on 11 + December 2022. The issue was made public on 20 February 2023.</p> + + <p>Affects: 11.0.0-M1</p> + + </section> + </body> </document> Modified: tomcat/site/trunk/xdocs/security-8.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1907777&r1=1907776&r2=1907777&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-8.xml (original) +++ tomcat/site/trunk/xdocs/security-8.xml Mon Feb 20 16:36:44 2023 @@ -56,6 +56,29 @@ <toc/> </section> + <section name="Fixed in Apache Tomcat 8.5.85" rtext="2023-01-19"> + + <p><strong>Important: Apache Tomcat denial of service</strong> + <cve>CVE-2023-24998</cve></p> + + <p>Apache Tomcat uses a packaged renamed copy of Apache Commons FileUpload + to provide the file upload functionality defined in the Jakarta Servlet + specification. Apache Tomcat was, therefore, also vulnerable to the + Apache Commons FileUpload vulnerability <cve>CVE-2023-24998</cve> as + there was no limit to the number of request parts processed. This + resulted in the possibility of an attacker triggering a DoS with a + malicious upload or series of uploads.</p> + + <p>This was fixed with commit + <hashlink hash="9ca96c8c1eba86c0aaa2e6be581ba2a7d4d4ae6e"/>.</p> + + <p>This issue was reported to the Apache Tomcat Security team on 11 + December 2022. The issue was made public on 20 February 2023.</p> + + <p>Affects: 8.5.0 to 8.5.84</p> + + </section> + <section name="Fixed in Apache Tomcat 8.5.84" rtext="2022-11-21"> <p><strong>Low: Apache Tomcat JsonErrorReportValve injection</strong> Modified: tomcat/site/trunk/xdocs/security-9.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1907777&r1=1907776&r2=1907777&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-9.xml (original) +++ tomcat/site/trunk/xdocs/security-9.xml Mon Feb 20 16:36:44 2023 @@ -50,6 +50,29 @@ <toc/> </section> + <section name="Fixed in Apache Tomcat 9.0.71" rtext="2023-01-13"> + + <p><strong>Important: Apache Tomcat denial of service</strong> + <cve>CVE-2023-24998</cve></p> + + <p>Apache Tomcat uses a packaged renamed copy of Apache Commons FileUpload + to provide the file upload functionality defined in the Jakarta Servlet + specification. Apache Tomcat was, therefore, also vulnerable to the + Apache Commons FileUpload vulnerability <cve>CVE-2023-24998</cve> as + there was no limit to the number of request parts processed. This + resulted in the possibility of an attacker triggering a DoS with a + malicious upload or series of uploads.</p> + + <p>This was fixed with commit + <hashlink hash="cf77cc545de0488fb89e24294151504a7432df74"/>.</p> + + <p>This issue was reported to the Apache Tomcat Security team on 11 + December 2022. The issue was made public on 20 February 2023.</p> + + <p>Affects: 9.0.0-M1 to 9.0.70</p> + + </section> + <section name="Fixed in Apache Tomcat 9.0.69" rtext="2022-11-14"> <p><strong>Low: Apache Tomcat JsonErrorReportValve injection</strong> --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org