ID

VAR-202302-1621


CVE

CVE-2023-24998


TITLE

Apache Tomcat  of  Apache Commons FileUpload  denial of service ( DoS ) vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2023-001220

DESCRIPTION

Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. The following data is constructed from data provided by Red Hat's json file at: https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_6570.json Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Web Server 5.7.4 release and security update Advisory ID: RHSA-2023:4909-01 Product: Red Hat JBoss Web Server Advisory URL: https://access.redhat.com/errata/RHSA-2023:4909 Issue date: 2023-09-04 CVE Names: CVE-2022-24963 CVE-2023-24998 CVE-2023-28708 CVE-2023-28709 ==================================================================== 1. Summary: An update is now available for Red Hat JBoss Web Server 5.7.4 on Red Hat Enterprise Linux versions 7, 8, and 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss Web Server 5.7 for RHEL 7 Server - noarch, x86_64 Red Hat JBoss Web Server 5.7 for RHEL 8 - noarch, x86_64 Red Hat JBoss Web Server 5.7 for RHEL 9 - noarch, x86_64 3. Description: Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This release of Red Hat JBoss Web Server 5.7.4 serves as a replacement for Red Hat JBoss Web Server 5.7.3. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References section. Security Fix(es): * apr: integer overflow/wraparound in apr_encode (CVE-2022-24963) * Apache Commons FileUpload: FileUpload DoS with excessive parts (CVE-2023-24998) * tomcat: not including the secure attribute causes information disclosure (CVE-2023-28708) * tomcat: Fix for CVE-2023-24998 was incomplete (CVE-2023-28709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files). For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2169465 - CVE-2022-24963 apr: integer overflow/wraparound in apr_encode 2172298 - CVE-2023-24998 Apache Commons FileUpload: FileUpload DoS with excessive parts 2180856 - CVE-2023-28708 tomcat: not including the secure attribute causes information disclosure 2210321 - CVE-2023-28709 tomcat: Fix for CVE-2023-24998 was incomplete 6. Package List: Red Hat JBoss Web Server 5.7 for RHEL 7 Server: Source: jws5-tomcat-9.0.62-15.redhat_00013.1.el7jws.src.rpm jws5-tomcat-native-1.2.31-15.redhat_15.el7jws.src.rpm noarch: jws5-tomcat-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-admin-webapps-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-docs-webapp-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-el-3.0-api-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-java-jdk11-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-java-jdk8-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-javadoc-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-jsp-2.3-api-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-lib-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-selinux-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-servlet-4.0-api-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-webapps-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm x86_64: jws5-tomcat-native-1.2.31-15.redhat_15.el7jws.x86_64.rpm jws5-tomcat-native-debuginfo-1.2.31-15.redhat_15.el7jws.x86_64.rpm Red Hat JBoss Web Server 5.7 for RHEL 8: Source: jws5-tomcat-9.0.62-15.redhat_00013.1.el8jws.src.rpm jws5-tomcat-native-1.2.31-15.redhat_15.el8jws.src.rpm noarch: jws5-tomcat-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-admin-webapps-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-docs-webapp-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-el-3.0-api-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-javadoc-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-jsp-2.3-api-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-lib-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-selinux-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-servlet-4.0-api-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-webapps-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm x86_64: jws5-tomcat-native-1.2.31-15.redhat_15.el8jws.x86_64.rpm jws5-tomcat-native-debuginfo-1.2.31-15.redhat_15.el8jws.x86_64.rpm Red Hat JBoss Web Server 5.7 for RHEL 9: Source: jws5-tomcat-9.0.62-15.redhat_00013.1.el9jws.src.rpm jws5-tomcat-native-1.2.31-15.redhat_15.el9jws.src.rpm noarch: jws5-tomcat-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-admin-webapps-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-docs-webapp-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-el-3.0-api-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-javadoc-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-jsp-2.3-api-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-lib-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-selinux-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-servlet-4.0-api-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-webapps-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm x86_64: jws5-tomcat-native-1.2.31-15.redhat_15.el9jws.x86_64.rpm jws5-tomcat-native-debuginfo-1.2.31-15.redhat_15.el9jws.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-24963 https://access.redhat.com/security/cve/CVE-2023-24998 https://access.redhat.com/security/cve/CVE-2023-28708 https://access.redhat.com/security/cve/CVE-2023-28709 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJk9dawAAoJENzjgjWX9erE1ycQAIwG6w749gWsv0nN3TgCLSn+ Ag1rdPKnc9K0BEer5aj3UZWq0ILQ0U2xkIV/+f03asPHSKehS0xAVAoTOB9eqDgB f7rcxV6tDwkkOgEHlCQZXle5CzMmIIuAmzQoRI855sl3fo7m1s9w/XGfM9TuwANu AAXKNZUc1EOtCzwQPbJ+RqwxXhiZvwaD1cXa/PtNmrmcFeQPjwZUTwWrs5KcDG/P CCIugcTaD8lCFRQFHtF+GXY9A1xzQ4sgGBeSa2+MRLV2e5nVGjby+1ydLIhThdvl 7bD+wtI7WOQkVI1ZrfiVuYU6gmQB1YoaYz3l8bjY+PvxoXANIDWI2y9QzLvjHRdX Q2DraXW6xMw0utFtFe5AiLevPH18VwBsdyUMOk8hpTQsRkw/Is7rIcHstucGJYSI CBVloQ8FbPXPUlTw4eYSr22c3bEyJKTACJIN+badVjzUlu7zewqF7g8BHXJGFIfT pwyfxOUfvAvn0qD8NvwE64yQ1pCIqcq/ffxliJp98cn86VrQ+H6+hwmxWOU1yoxe jyON4uVUE+IcaPPP84SUyGZW+ZgZjrdkBv4OaBsMvQweIPXLk54/dkgDtdOMF6EJ 3AX0KKqoSTFWJ7i64DWturuhAFRTdqkxeItLWM5LMo0FKsZur8efbRRnSHQhNUib PKxvfGMcijaSUTJ0s70k =7k// -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5522-1 security@debian.org https://www.debian.org/security/ Markus Koschany October 10, 2023 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : tomcat9 CVE ID : CVE-2023-24998 CVE-2023-41080 CVE-2023-42795 CVE-2023-44487 CVE-2023-45648 Several security vulnerabilities have been discovered in the Tomcat servlet and JSP engine. CVE-2023-24998 Denial of service. CVE-2023-41080 Open redirect. If the ROOT (default) web application is configured to use FORM authentication then it is possible that a specially crafted URL could be used to trigger a redirect to an URL of the attackers choice. CVE-2023-42795 Information Disclosure. When recycling various internal objects, including the request and the response, prior to re-use by the next request/response, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. CVE-2023-44487 DoS caused by HTTP/2 frame overhead (Rapid Reset Attack) CVE-2023-45648 Request smuggling. Tomcat did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. For the oldstable distribution (bullseye), these problems have been fixed in version 9.0.43-2~deb11u7. We recommend that you upgrade your tomcat9 packages. For the detailed security status of tomcat9 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tomcat9 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmUlyBRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeRBnhAAk1o0EDLnX1zaS0Xnz9jybhd9XdXat1HwZXvV3XFRGVXu5+r2bKH+KQjU 0GJ6koP3KDt10DrI8DzOq+9Msu0/TbPYAZKDHPjPYfcUqXRmwRrvTXtq5cbR5v3+ JxgJhiqjQYb1DYiDLC5iU+6aryrZg2ma1i81lG5v8N1TDfaCHzbZiMpyeYEABkd7 eKX3tzngoK9UaIgYVBxrjnM9bPRWnRFJRBMu/hs4VS6gxqzAaZT72Tcaf0Vf3t1s Es5IMgrhBC0Q2Amlm3N5z37p0nlhnJdNC3dAHetRCy92g9/KsjB/1BZfYY7rM8wV WwvB5WwQ0T4eRqKmc8yY86sUdfXkhPqz1oFDbnNgxtBjMm2z/of9pNEm+2NCpv9P 3MpCIKsEWiGH8+uleGuFhAHoWeUYjDNJjH1di6+PYZoBaEJ8eiXct/THBt/0nvFR Nh6AFDqi1Hi5/GdPK71eFRDsXOwgSuRg1ZRJtJP1W/dYEiczP89l0CM04PwxEAn2 dbE2ZCUQmIzQdng4OAHt+ze+QDini4HtoRJnQHq4P/QUIEQAE9C0hOIMMnrtpqIY A77Qa1bBVqDgLlhvSmpSrVigmfyXSpmtfc9G0KXcq5IAvr75jZ0PNuIk/VTyklYj e3g3nA1rbB1jlx6cvPqWBFItXW8800mJ0CXHb8EN8jKdB5BnooY= =6KYM -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202305-37 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Low Title: Apache Tomcat: Multiple Vulnerabilities Date: May 30, 2023 Bugs: #878911, #889596, #896370, #907387 ID: 202305-37 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been found in Apache Tomcat, the worst of which could result in denial of service. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Apache Tomcat users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/tomcat-10.1.8" References ========= [ 1 ] CVE-2022-42252 https://nvd.nist.gov/vuln/detail/CVE-2022-42252 [ 2 ] CVE-2022-45143 https://nvd.nist.gov/vuln/detail/CVE-2022-45143 [ 3 ] CVE-2023-24998 https://nvd.nist.gov/vuln/detail/CVE-2023-24998 [ 4 ] CVE-2023-28709 https://nvd.nist.gov/vuln/detail/CVE-2023-28709 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202305-37 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . The purpose of this text-only errata is to inform you about the security issues fixed. Security Fix(es): * snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857) * JXPath: untrusted XPath expressions may lead to RCE attack (CVE-2022-41852) * hsqldb: Untrusted input may lead to RCE attack (CVE-2022-41853) * xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow (CVE-2022-41966) * springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern (CVE-2023-20860) * apache-commons-net: FTP client trusts the host from PASV response by default (CVE-2021-37533) * undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492) * apache-spark: XSS vulnerability in log viewer UI Javascript (CVE-2022-31777) * Apache Pulsar: Improper Hostname Verification in Java Client and Proxy can expose authentication data via MITM (CVE-2022-33681) * apache-ivy: Directory Traversal (CVE-2022-37865) * : Apache Ivy: Ivy Path traversal (CVE-2022-37866) * batik: Server-Side Request Forgery (CVE-2022-38398) * batik: Server-Side Request Forgery (CVE-2022-38648) * snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode (CVE-2022-38749) * snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject (CVE-2022-38750) * snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match (CVE-2022-38751) * snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752) * scandium: Failing DTLS handshakes may cause throttling to block processing of records (CVE-2022-39368) * batik: Server-Side Request Forgery (SSRF) vulnerability (CVE-2022-40146) * xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40151) * woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40152) * xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40156) * batik: Apache XML Graphics Batik vulnerable to code execution via SVG (CVE-2022-41704) * dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854) * codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881) * jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003) * jackson-databind: use of deeply nested arrays (CVE-2022-42004) * batik: Untrusted code execution in Apache XML Graphics Batik (CVE-2022-42890) * jettison: Uncontrolled Recursion in JSONArray (CVE-2023-1436) * springframework: Spring Expression DoS Vulnerability (CVE-2023-20861) * shiro: Authentication bypass through a specially crafted HTTP request (CVE-2023-22602) * Apache Commons FileUpload: FileUpload DoS with excessive parts (CVE-2023-24998) * jettison: memory exhaustion via user-supplied XML or JSON data (CVE-2022-40150) * springframework: Spring Expression DoS Vulnerability (CVE-2023-20863) * json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) (CVE-2023-1370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/): 2126789 - CVE-2022-25857 snakeyaml: Denial of Service due to missing nested depth limitation for collections 2129706 - CVE-2022-38749 snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode 2129707 - CVE-2022-38750 snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject 2129709 - CVE-2022-38751 snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match 2129710 - CVE-2022-38752 snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode 2134288 - CVE-2022-40156 xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks 2134291 - CVE-2022-40152 woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks 2134292 - CVE-2022-40151 xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks 2135244 - CVE-2022-42003 jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS 2135247 - CVE-2022-42004 jackson-databind: use of deeply nested arrays 2135770 - CVE-2022-40150 jettison: memory exhaustion via user-supplied XML or JSON data 2136128 - CVE-2022-41852 JXPath: untrusted XPath expressions may lead to RCE attack 2136141 - CVE-2022-41853 hsqldb: Untrusted input may lead to RCE attack 2136207 - CVE-2022-33681 Apache Pulsar: Improper Hostname Verification in Java Client and Proxy can expose authentication data via MITM 2145205 - CVE-2022-39368 scandium: Failing DTLS handshakes may cause throttling to block processing of records 2145264 - CVE-2022-31777 apache-spark: XSS vulnerability in log viewer UI Javascript 2150011 - CVE-2022-37866 : Apache Ivy: Ivy Path traversal 2151988 - CVE-2022-41854 dev-java/snakeyaml: DoS via stack overflow 2153260 - CVE-2022-4492 undertow: Server identity in https connection is not checked by the undertow client 2153379 - CVE-2022-41881 codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS 2155291 - CVE-2022-40146 batik: Server-Side Request Forgery (SSRF) vulnerability 2155292 - CVE-2022-38398 batik: Server-Side Request Forgery 2155295 - CVE-2022-38648 batik: Server-Side Request Forgery 2169924 - CVE-2021-37533 apache-commons-net: FTP client trusts the host from PASV response by default 2170431 - CVE-2022-41966 xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow 2172298 - CVE-2023-24998 Apache Commons FileUpload: FileUpload DoS with excessive parts 2180528 - CVE-2023-20860 springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern 2180530 - CVE-2023-20861 springframework: Spring Expression DoS Vulnerability 2182182 - CVE-2022-41704 batik: Apache XML Graphics Batik vulnerable to code execution via SVG 2182183 - CVE-2022-42890 batik: Untrusted code execution in Apache XML Graphics Batik 2182188 - CVE-2022-37865 apache-ivy: Directory Traversal 2182198 - CVE-2023-22602 shiro: Authentication bypass through a specially crafted HTTP request 2182788 - CVE-2023-1436 jettison: Uncontrolled Recursion in JSONArray 2187742 - CVE-2023-20863 springframework: Spring Expression DoS Vulnerability 2188542 - CVE-2023-1370 json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) 5

Trust: 2.34

sources: NVD: CVE-2023-24998 // JVNDB: JVNDB-2023-001220 // VULMON: CVE-2023-24998 // PACKETSTORM: 175549 // PACKETSTORM: 175724 // PACKETSTORM: 174475 // PACKETSTORM: 174474 // PACKETSTORM: 175070 // PACKETSTORM: 172624 // PACKETSTORM: 172140

AFFECTED PRODUCTS

vendor:apachemodel:commons fileuploadscope:eqversion:1.0

Trust: 1.0

vendor:apachemodel:commons fileuploadscope:ltversion:1.5

Trust: 1.0

vendor:apachemodel:commons fileuploadscope:gteversion:1.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:日本電気model:nec advanced analytics platform modelerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - smart device managerscope: - version: -

Trust: 0.8

vendor:日本電気model:neoface monitorscope: - version: -

Trust: 0.8

vendor:日立model:job management partner 1/it desktop management 2 - managerscope: - version: -

Trust: 0.8

vendor:日立model:hitachi tuning managerscope: - version: -

Trust: 0.8

vendor:apachemodel:tomcatscope: - version: -

Trust: 0.8

vendor:日本電気model:nec information assessment systemscope: - version: -

Trust: 0.8

vendor:日本電気model:enterpriseidentitymanagerscope: - version: -

Trust: 0.8

vendor:日本電気model:nec 自動応答scope: - version: -

Trust: 0.8

vendor:日本電気model:websam it process managementscope: - version: -

Trust: 0.8

vendor:日立model:jp1/performance managementscope: - version: -

Trust: 0.8

vendor:apachemodel:commons fileuploadscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - managerscope: - version: -

Trust: 0.8

vendor:日本電気model:webotx application serverscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management - managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - operations directorscope: - version: -

Trust: 0.8

vendor:日本電気model:esmpro/servermanagerscope: - version: -

Trust: 0.8

vendor:日立model:job management partner 1/it desktop management - managerscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive pfscope: - version: -

Trust: 0.8

vendor:日本電気model:actsecure ポータルscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-001220 // NVD: CVE-2023-24998

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-24998
value: HIGH

Trust: 1.0

NVD: CVE-2023-24998
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-1610
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2023-24998
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2023-24998
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNNVD: CNNVD-202302-1610 // JVNDB: JVNDB-2023-001220 // NVD: CVE-2023-24998

PROBLEMTYPE DATA

problemtype:CWE-770

Trust: 1.0

problemtype:Determination of boundary conditions (CWE-193) [ others ]

Trust: 0.8

problemtype: Allocation of resources without limits or throttling (CWE-770) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-001220 // NVD: CVE-2023-24998

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202302-1610

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202302-1610

PATCH

title:hitachi-sec-2024-119url:https://commons.apache.org/proper/commons-fileupload/security-reports.html#Fixed_in_Apache_Commons_FileUpload_1.5

Trust: 0.8

title:Apache Commons FileUpload Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=227328

Trust: 0.6

title:Debian CVElist Bug Report Logs: libcommons-fileupload-java: CVE-2023-24998url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=d5c27d5122389b2993bab30e55fe65cf

Trust: 0.1

title:Red Hat: url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2023-24998

Trust: 0.1

sources: VULMON: CVE-2023-24998 // CNNVD: CNNVD-202302-1610 // JVNDB: JVNDB-2023-001220

EXTERNAL IDS

db:NVDid:CVE-2023-24998

Trust: 4.0

db:OPENWALLid:OSS-SECURITY/2023/05/22/1

Trust: 1.6

db:ICS CERTid:ICSA-24-046-15

Trust: 0.8

db:JVNid:JVNVU91198149

Trust: 0.8

db:JVNid:JVNVU91253151

Trust: 0.8

db:JVNDBid:JVNDB-2023-001220

Trust: 0.8

db:AUSCERTid:ESB-2023.3457

Trust: 0.6

db:AUSCERTid:ESB-2023.2030

Trust: 0.6

db:AUSCERTid:ESB-2023.3098

Trust: 0.6

db:AUSCERTid:ESB-2023.1629

Trust: 0.6

db:AUSCERTid:ESB-2023.3839

Trust: 0.6

db:AUSCERTid:ESB-2023.2979

Trust: 0.6

db:AUSCERTid:ESB-2023.3596

Trust: 0.6

db:AUSCERTid:ESB-2023.3113

Trust: 0.6

db:AUSCERTid:ESB-2023.3425

Trust: 0.6

db:AUSCERTid:ESB-2023.1590

Trust: 0.6

db:AUSCERTid:ESB-2023.1527

Trust: 0.6

db:AUSCERTid:ESB-2023.1085

Trust: 0.6

db:AUSCERTid:ESB-2023.1526

Trust: 0.6

db:AUSCERTid:ESB-2023.1468

Trust: 0.6

db:CNNVDid:CNNVD-202302-1610

Trust: 0.6

db:VULMONid:CVE-2023-24998

Trust: 0.1

db:PACKETSTORMid:175549

Trust: 0.1

db:PACKETSTORMid:175724

Trust: 0.1

db:PACKETSTORMid:174475

Trust: 0.1

db:PACKETSTORMid:174474

Trust: 0.1

db:PACKETSTORMid:175070

Trust: 0.1

db:PACKETSTORMid:172624

Trust: 0.1

db:PACKETSTORMid:172140

Trust: 0.1

sources: VULMON: CVE-2023-24998 // PACKETSTORM: 175549 // PACKETSTORM: 175724 // PACKETSTORM: 174475 // PACKETSTORM: 174474 // PACKETSTORM: 175070 // PACKETSTORM: 172624 // PACKETSTORM: 172140 // CNNVD: CNNVD-202302-1610 // JVNDB: JVNDB-2023-001220 // NVD: CVE-2023-24998

REFERENCES

url:https://lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy

Trust: 1.7

url:https://security.gentoo.org/glsa/202305-37

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2023/05/22/1

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2023-24998

Trust: 1.4

url:https://nvd.nist.gov/vuln/detail/cve-2023-28709

Trust: 1.1

url:https://access.redhat.com/security/cve/cve-2023-24998

Trust: 1.0

url:https://www.debian.org/security/2023/dsa-5522

Trust: 1.0

url:https://security.netapp.com/advisory/ntap-20230302-0013/

Trust: 1.0

url:https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html

Trust: 1.0

url:https://lists.debian.org/debian-lts-announce/2025/07/msg00008.html

Trust: 1.0

url:https://security.netapp.com/advisory/ntap-20241108-0002/

Trust: 1.0

url:http://jvn.jp/vu/jvnvu91253151/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91198149/index.html

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-15

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2023.2030

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1590

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1085

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3098

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3457

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1468

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3425

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3596

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3113

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3839

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1629

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2023-24998/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1526

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.2979

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1527

Trust: 0.6

url:https://access.redhat.com/articles/11258

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-24963

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-28708

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-24963

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-28709

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-28708

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/770.html

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031733

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:6570

Trust: 0.1

url:https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_6570.json

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=2173874

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=2189676

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:7065

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=2172298

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=2210321

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=2180856

Trust: 0.1

url:https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_7065.json

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:4910

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-28331

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=webserver&version=5.7

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28331

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:4909

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-44487

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-45648

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-41080

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-42795

Trust: 0.1

url:https://security-tracker.debian.org/tracker/tomcat9

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-45143

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42252

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:2100

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31777

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-4492

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1370

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38648

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38398

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38749

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40146

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41852

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41853

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37533

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40156

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41854

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-31777

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42004

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41966

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-22602

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37533

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1436

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-40146

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38648

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38751

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38398

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-37866

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40152

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41881

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38752

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42003

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-20860

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38749

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-39368

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=red.hat.integration&version=2023-q2

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41704

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25857

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40150

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42890

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-37865

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40151

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-37865

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25857

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-33681

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-33681

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38751

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-39368

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-20863

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-20861

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38752

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-37866

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38750

Trust: 0.1

sources: VULMON: CVE-2023-24998 // PACKETSTORM: 175549 // PACKETSTORM: 175724 // PACKETSTORM: 174475 // PACKETSTORM: 174474 // PACKETSTORM: 175070 // PACKETSTORM: 172624 // PACKETSTORM: 172140 // CNNVD: CNNVD-202302-1610 // JVNDB: JVNDB-2023-001220 // NVD: CVE-2023-24998

CREDITS

Red Hat

Trust: 0.5

sources: PACKETSTORM: 175549 // PACKETSTORM: 175724 // PACKETSTORM: 174475 // PACKETSTORM: 174474 // PACKETSTORM: 172140

SOURCES

db:VULMONid:CVE-2023-24998
db:PACKETSTORMid:175549
db:PACKETSTORMid:175724
db:PACKETSTORMid:174475
db:PACKETSTORMid:174474
db:PACKETSTORMid:175070
db:PACKETSTORMid:172624
db:PACKETSTORMid:172140
db:CNNVDid:CNNVD-202302-1610
db:JVNDBid:JVNDB-2023-001220
db:NVDid:CVE-2023-24998

LAST UPDATE DATE

2026-02-06T22:16:27.266000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-24998date:2023-02-23T00:00:00
db:CNNVDid:CNNVD-202302-1610date:2023-07-10T00:00:00
db:JVNDBid:JVNDB-2023-001220date:2024-05-29T07:11:00
db:NVDid:CVE-2023-24998date:2025-11-03T22:16:05.550

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-24998date:2023-02-20T00:00:00
db:PACKETSTORMid:175549date:2023-11-13T21:01:39
db:PACKETSTORMid:175724date:2023-11-15T14:07:20
db:PACKETSTORMid:174475date:2023-09-04T17:29:56
db:PACKETSTORMid:174474date:2023-09-04T17:29:45
db:PACKETSTORMid:175070date:2023-10-11T16:46:58
db:PACKETSTORMid:172624date:2023-05-30T16:32:27
db:PACKETSTORMid:172140date:2023-05-04T14:33:07
db:CNNVDid:CNNVD-202302-1610date:2023-02-20T00:00:00
db:JVNDBid:JVNDB-2023-001220date:2023-02-22T00:00:00
db:NVDid:CVE-2023-24998date:2023-02-20T16:15:10.423