BDU:2024-11286

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

Уязвимость сервлета DefaultServlet сервера приложений Apache Tomcat связана с ошибками синхронизации при использовании общего ресурса («Ситуация гонки»). Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, выполнить произвольный код

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

bdu

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-50379

Source: github-poc

URL: https://github.com/Yuri08loveElaina/CVE-2024-50379

Recommendations

Source: bdu

Использование рекомендаций:
https://lists.apache.org/thread/y6lj6q1xnp822g6ro70tn19sgtjmr80r
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security -9.html

Для РедОС: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/

Компенсирующие меры:
- ограничение возможности загрузки JSP-файлов в каталоги сервера приложений с помощью сервлетов;
- использование средств межсетевого экранирования уровня веб-приложений для ограничения возможности удалённого доступа к серверу приложений;
- использование средств обнаружения и предотвращения вторжений (IDS/IPS) для отслеживания подключений к серверу приложений и загрузки файлов;
- использование виртуальных частных сетей для организации удаленного доступа (VPN).

Обновление программного обеспечения tomcat9 до версии 9.0.43+repack-2~deb11u11.osnova2u1



Для ОС АЛЬТ СП 10: установка обновления из публичного репозитория программного средства:
https://altsp.su/obnovleniya-bezopasnosti/

https://altsp.su/obnovleniya-bezopasnosti/

Для ОС Альт 8 СП: установка обновления из публичного репозитория программного средства: https://altsp.su/obnovleniya-bezopasnosti/

Для Libercat Certified:
Обновление ПО до актуальной версии

URL: https://bdu.fstec.ru/vul/2024-11286

Vulnerable Software (20)

Type: Configuration

Vendor: apache software foundation

Product: tomcat

Operating System: redos 7.3

Trait:
{  "version_end_including": "11.0.1",  "version_start_including": "11.0.0-M1"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: tomcat

Operating System: redos 7.3

Trait:
{  "version_end_including": "10.1.33",  "version_start_including": "10.1.0-M1"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: tomcat

Operating System: redos 7.3

Trait:
{  "version_end_including": "9.0.97",  "version_start_including": "9.0.0.M1"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: tomcat

Operating System: altlinux 8

Trait:
{  "version_end_including": "11.0.1",  "version_start_including": "11.0.0-M1"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: tomcat

Operating System: altlinux 8

Trait:
{  "version_end_including": "10.1.33",  "version_start_including": "10.1.0-M1"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: tomcat

Operating System: altlinux 8

Trait:
{  "version_end_including": "9.0.97",  "version_start_including": "9.0.0.M1"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: tomcat

Operating System: altlinux 10

Trait:
{  "version_end_including": "11.0.1",  "version_start_including": "11.0.0-M1"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: tomcat

Operating System: altlinux 10

Trait:
{  "version_end_including": "10.1.33",  "version_start_including": "10.1.0-M1"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: tomcat

Operating System: altlinux 10

Trait:
{  "version_end_including": "9.0.97",  "version_start_including": "9.0.0.M1"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: tomcat

Operating System: осон основа оnyx *

Trait:
{  "version_end_including": "11.0.1",  "version_start_including": "11.0.0-M1"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: tomcat

Operating System: осон основа оnyx *

Trait:
{  "version_end_including": "10.1.33",  "version_start_including": "10.1.0-M1"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: tomcat

Operating System: осон основа оnyx *

Trait:
{  "version_end_including": "9.0.97",  "version_start_including": "9.0.0.M1"}

Source: bdu

Type: Configuration

Vendor: axiom jdk

Product: libercat certified

Operating System: redos 7.3

Trait:
{  "version_end_excluding": "10.1.43-1"}

Source: bdu

Type: Configuration

Vendor: axiom jdk

Product: libercat certified

Operating System: redos 7.3

Trait:
{  "version_end_excluding": "9.0.107-1"}

Source: bdu

Type: Configuration

Vendor: axiom jdk

Product: libercat certified

Operating System: altlinux 8

Trait:
{  "version_end_excluding": "10.1.43-1"}

Source: bdu

Type: Configuration

Vendor: axiom jdk

Product: libercat certified

Operating System: altlinux 8

Trait:
{  "version_end_excluding": "9.0.107-1"}

Source: bdu

Type: Configuration

Vendor: axiom jdk

Product: libercat certified

Operating System: altlinux 10

Trait:
{  "version_end_excluding": "10.1.43-1"}

Source: bdu

Type: Configuration

Vendor: axiom jdk

Product: libercat certified

Operating System: altlinux 10

Trait:
{  "version_end_excluding": "9.0.107-1"}

Source: bdu

Type: Configuration

Vendor: axiom jdk

Product: libercat certified

Operating System: осон основа оnyx *

Trait:
{  "version_end_excluding": "10.1.43-1"}

Source: bdu

Type: Configuration

Vendor: axiom jdk

Product: libercat certified

Operating System: осон основа оnyx *

Trait:
{  "version_end_excluding": "9.0.107-1"}

Source: bdu

End of list