CVE-2024-56337 Apache Tomcat - RCE via write-enabled default servlet - CVE-2024-50379 mitigation was incomplete

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
Apache Tomcat 11.0.0-M1 to 11.0.1
Apache Tomcat 10.1.0-M1 to 10.1.33
Apache Tomcat 9.0.0.M1 to 9.0.97

Description:
Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat.

Mitigation:
Users of the affected versions should apply one of the following
mitigations:
- Upgrade to Apache Tomcat 11.0.2 or later
- Upgrade to Apache Tomcat 10.1.34 or later
- Upgrade to Apache Tomcat 9.0.98 or later
- running on Java 8 or Java 11: the system property
  sun.io.useCanonCaches must be explicitly set to false (it defaults
  to true)
- running on Java 17: the system property sun.io.useCanonCaches,
  if set, must be set to false (it defaults to false)
- running on Java 21 onwards: no further configuration is required
  (the system property and the problematic cache have been removed)

Credit:
This vulnerability identified by Nacl, WHOAMI, Yemoli and Ruozhi.
This vulnerability was independently reported with a very helpful PoC by dawu@knownsec 404 team and Sunflower@knownsec 404 team.

History:
2024-12-20 Original advisory

References:
[1] https://tomcat.apache.org/security-11.html
[2] https://tomcat.apache.org/security-10.html
[3] https://tomcat.apache.org/security-9.html

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to