Apache Tomcat, one of the most widely used open-source web servers and servlet containers, has recently been found vulnerable to a critical security flaw, CVE-2024-50379. This vulnerability, with a CVSS score of 9.8, exposes systems to remote code execution (RCE) under specific configurations, making it a significant threat to enterprises relying on Tomcat for Java-based web applications. Read about the details of CVE-2024-50379, its impact and outline mitigation steps to secure your systems.
A new critical vulnerability exposes systems to remote code execution (RCE) was recently discovered in Apache Tomcat, a well-known and common open-source web server and servlet container. The software has been found vulnerable to a critical security flaw possessing threat to enterprises relying on Tomcat for Java-based web applications. In this blog, we will explore the details of CVE-2024-50379, assess its impact, and outline mitigation steps.
Affected products: |
Apache Tomcat versions 11.0.0-M1 to 11.0.1, 10.1.0-M1 to 10.1.33, and 9.0.0.M1 to 9.0.97 |
Product category: |
Web Application Security |
Severity: |
Critical (CVSS Score: 9.8) |
Type: |
Time-of-check Time-of-use (TOCTOU) race condition vulnerability |
Impact: |
Remote Code Execution (RCE) |
PoC: |
|
Exploit in the wild |
No |
CISA Catalog |
|
Remediation action |
|
MITRE advisory |
The vulnerability impacts the following Apache Tomcat versions:
You may be affected by CVE-2024-50379 if your systems meet the following conditions:
Administrators should review their configurations and assess if their systems align with these conditions to determine exposure.
At the time of writing, there are no confirmed reports of active exploitation of CVE-2024-50379 in the wild. However, the Apache Software Foundation (ASF) has credited several security researchers for independently identifying and reporting the flaw, including proof-of-concept (PoC) code.
The availability of PoC increases the likelihood of exploitation, especially in environments where mitigation steps have not been implemented.
To address CVE-2024-50379, Apache has released updates and provided detailed configuration changes to secure affected systems:
By following these steps, you can significantly reduce the risk posed by CVE-2024-50379 and secure your systems against potential attacks. Stay vigilant and ensure that your systems are updated and properly configured to minimize vulnerabilities. For additional insights and updates, refer to the official Apache Tomcat security advisories.
By following these steps, you can significantly reduce the risk posed by CVE-2024-50379 and secure your systems against potential attacks. Stay vigilant and ensure that your systems are updated and properly configured to minimize vulnerabilities. For additional insights and updates, refer to the official Apache Tomcat security advisories.
Each new vulnerability is a reminder of where we stand, and what we need to do better. Check out the following resources to help you maintain cyber hygiene and stay ahead of the threat actors: