Lucene search

K
amazonAmazonALAS-2024-2517
HistoryApr 11, 2024 - 1:07 a.m.

Important: tomcat

2024-04-1101:07:00
alas.aws.amazon.com
5
apache tomcat
denial of service
file upload
security advisory
amazon linux 2

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.034 Low

EPSS

Percentile

91.3%

Issue Overview:

Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads.

Note that, like all of the file upload limits, the
new configuration option (FileUploadBase#setFileCountMax) is not
enabled by default and must be explicitly configured. (CVE-2023-24998)

The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. (CVE-2023-28709)

Affected Packages:

tomcat

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update tomcat to update your system.

New Packages:

noarch:  
    tomcat-7.0.76-10.amzn2.0.9.noarch  
    tomcat-admin-webapps-7.0.76-10.amzn2.0.9.noarch  
    tomcat-docs-webapp-7.0.76-10.amzn2.0.9.noarch  
    tomcat-javadoc-7.0.76-10.amzn2.0.9.noarch  
    tomcat-jsvc-7.0.76-10.amzn2.0.9.noarch  
    tomcat-jsp-2.2-api-7.0.76-10.amzn2.0.9.noarch  
    tomcat-lib-7.0.76-10.amzn2.0.9.noarch  
    tomcat-servlet-3.0-api-7.0.76-10.amzn2.0.9.noarch  
    tomcat-el-2.2-api-7.0.76-10.amzn2.0.9.noarch  
    tomcat-webapps-7.0.76-10.amzn2.0.9.noarch  
  
src:  
    tomcat-7.0.76-10.amzn2.0.9.src  

Additional References

Red Hat: CVE-2023-24998, CVE-2023-28709

Mitre: CVE-2023-24998, CVE-2023-28709

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.034 Low

EPSS

Percentile

91.3%