CVE-2024-50379
CVE-2024-50379: Apache Tomcat TOCTOU Race Condition vulnerability. This flaw allows for potential Remote Code Execution (RCE) on case-insensitive file systems. This vulnerability exists during JSP compilation when the default servlet is enabled for write access, a non-default setting. Affecting Apache Tomcat versions 11.0.0-M1 through 11.0.1, 10.1.0-M1 through 10.1.33, and 9.0.0.M1 through 9.0.97. Given SOCRadar's Vulnerability Risk Score (SVRS) of 74, while not critical (above 80), it represents a significant risk due to the existence of active exploits and the potential for RCE. Users are advised to upgrade to versions 11.0.2, 10.1.34, or 9.0.98 to mitigate this security risk and prevent potential compromise of systems.
Description
CVE-2024-50379 is a critical Remote Code Execution (RCE) vulnerability stemming from a Time-of-check Time-of-use (TOCTOU) Race Condition during JSP compilation in Apache Tomcat. This vulnerability is exploitable when the default servlet is enabled for write, a non-default configuration, and affects versions of Apache Tomcat ranging from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, and from 9.0.0.M1 through 9.0.97. The SVRS score for this vulnerability is 74, indicating a high-severity threat requiring immediate attention.
Key Insights
- High-Severity RCE: This vulnerability allows an attacker to execute arbitrary code on a vulnerable system, enabling complete compromise of the affected server.
- Exploit Availability: Active exploits are publicly available, meaning attackers can easily exploit the vulnerability.
- Wide Impact: The vulnerability affects a wide range of Apache Tomcat versions commonly deployed in web applications, increasing its potential for exploitation.
- Case-Insensitive File Systems: The exploit hinges on case-insensitive file systems, a common configuration in certain operating systems.
Mitigation Strategies
- Upgrade Apache Tomcat: Prioritize upgrading to the latest version (11.0.2, 10.1.34 or 9.0.98) to patch the vulnerability.
- Disable Default Servlet for Write Access: If upgrading is not immediately possible, disable write access for the default servlet. This mitigates the RCE vulnerability by preventing attackers from exploiting the TOCTOU race condition.
- Implement WAF/IDS: Consider deploying a web application firewall (WAF) or intrusion detection system (IDS) to monitor and block potential malicious requests targeting the vulnerable components.
- Network Segmentation: Isolate the vulnerable servers from critical network resources to limit the impact of potential exploitation.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.