CVE-2024-56337
December 20, 2024
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions
may also be affected.
The mitigation for CVE-2024-50379 was incomplete.
Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation
parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:
- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)
- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)
- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)
Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.
Affected Packages
org.apache.tomcat:tomcat-catalina (JAVA):
Affected version(s) >=10.1.0-M1 <10.1.34Fix Suggestion:
Update to version 10.1.34org.apache.tomcat.embed:tomcat-embed-core (JAVA):
Affected version(s) >=9.0.0.M1 <9.0.98Fix Suggestion:
Update to version 9.0.98org.apache.tomcat:tomcat-catalina (JAVA):
Affected version(s) >=11.0.0-M1 <11.0.2Fix Suggestion:
Update to version 11.0.2org.apache.tomcat.embed:tomcat-embed-core (JAVA):
Affected version(s) >=10.1.0-M1 <10.1.34Fix Suggestion:
Update to version 10.1.34org.apache.tomcat.embed:tomcat-embed-core (JAVA):
Affected version(s) >=11.0.0-M1 <11.0.2Fix Suggestion:
Update to version 11.0.2Additional Notes
The description of this vulnerability differs from MITRE.
Related Resources (11)
Do you need more information?
Contact UsCVSS v4
Base Score:
9.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
Exploit Maturity
UNREPORTED
CVSS v3
Base Score:
9.8
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Time-of-check Time-of-use (TOCTOU) Race Condition
EPSS
Base Score:
10.13