Race Condition Vulnerability in Apache Tomcat Allows Remote Code Execution

CVE-2024-50379

Currently unrated 🤨

Key Information

Vendor
Apache
Vendor
CVE Published:
17 December 2024

Badges

😄 Trended👾 Exploit Exists🔴 Public PoC

What is CVE-2024-50379?

CVE-2024-50379 is a serious vulnerability affecting Apache Tomcat, an open-source implementation of the Java Servlet, JavaServer Pages, and other Java EE technologies. This particular vulnerability arises from a Time-of-check Time-of-use (TOCTOU) race condition during JSP compilation that could allow remote code execution (RCE) on systems utilizing case-insensitive file systems when the default servlet is configured to allow write access. Such a flaw can significantly undermine the integrity and security of organizations relying on Apache Tomcat for hosting Java applications, potentially leading to unauthorized control over critical systems.

Technical Details

The vulnerability impacts several versions of Apache Tomcat, specifically from 11.0.0-M1 to 11.0.1, 10.1.0-M1 to 10.1.33, and 9.0.0.M1 to 9.0.97. It's caused by a race condition that emerges when JSP files are compiled, allowing attackers to exploit the timing differences between checking file states and actually using them. This vulnerability primarily affects installations with non-default configurations where the default servlet’s write capabilities are enabled. Users are advised to upgrade to fixed versions: 11.0.2, 10.1.34, or 9.0.08 to mitigate the risk posed by this vulnerability.

Potential impact of CVE-2024-50379

  1. Remote Code Execution: The most significant impact is the ability for an attacker to execute arbitrary code on affected systems. This could lead to full system compromise, where the attacker gains control over server operations.

  2. Data Breach Risks: With remote code execution capabilities, attackers could access sensitive data, leading to potential data breaches, loss of confidential information, and compliance violations, especially in industries handling sensitive data.

  3. Service Disruption: Exploitation of this vulnerability may result in service interruption or degradation, as attackers can manipulate the server's behavior or crash the service. This can lead to downtime, loss of availability, and damage to organizational reputation.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

Refferences

Timeline

  • 🔴

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability started trending

  • Vulnerability published

Collectors

NVD Database3 Proof of Concept(s)
.