
We found results for “”
CVE-2023-24998
Good to know:


Date: February 20, 2023
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.
Language: Java
Severity Score
Related Resources (23)
Severity Score
Weakness Type (CWE)
Allocation of Resources Without Limits or Throttling
CWE-770Top Fix

Upgrade Version
Upgrade to version org.apache.tomcat.embed:tomcat-embed-core:10.1.5;org.apache.tomcat.embed:tomcat-embed-core:11.0.0-M5;org.apache.tomcat.embed:tomcat-embed-core:8.5.88;org.apache.tomcat.embed:tomcat-embed-core:9.0.71;org.apache.tomcat:tomcat-coyote:10.1.5;org.apache.tomcat:tomcat-coyote:11.0.0-M5;org.apache.tomcat:tomcat-coyote:8.5.88;org.apache.tomcat:tomcat-coyote:9.0.71;commons-fileupload:commons-fileupload:1.5
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | HIGH |