CVE-2024-24549

Scores

EPSS

0.644medium64.4%
0%20%40%60%80%100%

Percentile: 64.4%

CVSS

7.5high3.x
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 3.x
7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Description

Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.

Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

anchore_overridesdebiannvdredhatubuntu

CWEs

CWE-20

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-24549

Source: github-poc

URL: https://github.com/JFOZ1010/CVE-2024-24549

Vulnerable Software (31)

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:apache:tomcat-embed-core:*:*:*:*:*:maven:*:*",          "versionEndExcluding": "11.0.0-M17",          "version...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:apache:tomcat-coyote:*:*:*:*:*:maven:*:*",          "versionEndExcluding": "11.0.0-M17",          "versionStar...

Source: anchore_overrides

Type: Configuration

Product: jws5-tomcat

Operating System: rhel

Trait:
{  "fixed": "9.0.62-41.redhat_00020.1.el7jws"}

Source: redhat

Type: Configuration

Product: jws5-tomcat

Operating System: rhel

Trait:
{  "fixed": "9.0.62-41.redhat_00020.1.el8jws"}

Source: redhat

Type: Configuration

Product: jws5-tomcat

Operating System: rhel

Trait:
{  "fixed": "9.0.62-41.redhat_00020.1.el9jws"}

Source: redhat

Type: Configuration

Product: jws5-tomcat-native

Operating System: rhel

Trait:
{  "fixed": "1.2.31-17.redhat_17.el7jws"}

Source: redhat

Type: Configuration

Product: jws5-tomcat-native

Operating System: rhel

Trait:
{  "fixed": "1.2.31-17.redhat_17.el8jws"}

Source: redhat

Type: Configuration

Product: jws5-tomcat-native

Operating System: rhel

Trait:
{  "fixed": "1.2.31-17.redhat_17.el9jws"}

Source: redhat

Type: Configuration

Product: jws6-tomcat

Operating System: rhel

Trait:
{  "fixed": "10.1.8-6.redhat_00013.1.el8jws"}

Source: redhat

Type: Configuration

Product: jws6-tomcat

Operating System: rhel

Trait:
{  "fixed": "10.1.8-6.redhat_00013.1.el9jws"}

Source: redhat

Type: Configuration

Product: tomcat

Operating System: rhel

Trait:
{  "fixed": "9.0.87-1.el8_10.1"}

Source: redhat

Type: Configuration

Product: tomcat

Operating System: rhel

Trait:
{  "fixed": "9.0.87-1.el8_8.2"}

Source: redhat

Type: Configuration

Product: tomcat

Operating System: rhel

Trait:
{  "fixed": "9.0.87-1.el9_4.1"}

Source: redhat

Type: Configuration

Product: tomcat

Operating System: rhel

Trait:
{  "fixed": "9.0.87-1.el9_2.1"}

Source: redhat

Type: Configuration

Product: tomcat10

Operating System: debian

Trait:
{  "fixed": "10.1.20-1"}

Source: debian

Type: Configuration

Product: tomcat10

Operating System: ubuntu mantic 23.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: ubuntu noble 24.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: ubuntu oracular 24.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: ubuntu plucky 25.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: ubuntu questing 25.10

Trait:
{  "unaffected": true}

Source: ubuntu