CVE-2024-50379

Scores

EPSS

0.865high86.5%
0%20%40%60%80%100%

Percentile: 86.5%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.

The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.

Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

anchore_overridesdebiannvdubuntu

CWEs

264CWE-367

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-50379

Source: github-poc

URL: https://github.com/Yuri08loveElaina/CVE-2024-50379

Vulnerable Software (16)

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:apache:tomcat-catalina:*:*:*:*:*:maven:*:*",          "versionEndExcluding": "11.0.2",          "versionStartI...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:apache:tomcat-embed-core:*:*:*:*:*:maven:*:*",          "versionEndExcluding": "11.0.2",          "versionStar...

Source: anchore_overrides

Type: Configuration

Product: tomcat10

Operating System: ubuntu noble 24.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: ubuntu oracular 24.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: ubuntu plucky 25.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: ubuntu questing 25.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: debian

Trait:
{  "fixed": "10.1.34-1"}

Source: debian

Type: Configuration

Product: tomcat9

Operating System: ubuntu focal 20.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat9

Operating System: ubuntu jammy 22.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat9

Operating System: ubuntu noble 24.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat9

Operating System: ubuntu oracular 24.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat9

Operating System: ubuntu plucky 25.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat9

Operating System: ubuntu questing 25.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat9

Operating System: debian

Trait:
{  "fixed": "9.0.70-2"}

Source: debian

Type: Configuration

Vendor: *

Product: bootstrap_os

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": "OR"   ...

Source: nvd

Type: Configuration

Vendor: *

Product: tomcat

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",      "versionEndExcluding": "9.0.98",      "versionStartIncluding": "9.0.0",      "vulnerable": true    },   ...

Source: nvd

End of list