Skip to main content

Security updates addressing CVE-2024-56337 fully mitigate CVE-2024-50379

Summary

Security updates addressing CVE-2024-56337 fully mitigate CVE-2024-50379

Affected platforms

Summary

Security updates addressing CVE-2024-56337 fully mitigate CVE-2024-50379




Affected platforms

The following platforms are known to be affected:

Threat details

Introduction

The Apache Software Foundation has released two security bulletins addressing critical vulnerabilities in Apache Tomcat. Tomcat is an open-source implementation of the Jakarta EE platform that provides a 'pure Java' HTTP web server environment.

On 17 December 2024, Apache issued a security bulletin addressing CVE-2024-50379, which is a 'Time-of check Time-of-use (TOCTOU) Race Condition' vulnerability with a CVSSv3 score of 9.8. If exploited, an unauthenticated attacker could achieve remote code execution (RCE) if the default servlet is enabled for write operations (non-default configuration) on case-insensitive file systems.

On 20 December 2024, Apache issued a second security bulletin advising that mitigation of CVE-2024-50379 was incomplete and assigned CVE-2024-56337 to address the issue. Apache advise additional mitigation steps may be required to fully remediate CVE-2024-56337, depending on the Java version used with Tomcat. 

Remediation advice

Affected organisations are strongly encouraged to review the Apache Security Bulletin for CVE-2024-56337 and apply the relevant updates and mitigations as soon as practicable.

Note: Depending on which Java version is used with Tomcat, additional mitigation steps may be required to fully remediate CVE-2024-56337. These are detailed below.

Remediation steps

Definitive source of threat updates

CVE Vulnerabilities

Last edited: 24 December 2024 11:35 am