ID

VAR-202302-1621


CVE

CVE-2023-24998


TITLE

Apache Tomcat  of  Apache Commons FileUpload  denial of service ( DoS ) vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2023-001220

DESCRIPTION

Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. Summary: An update for jenkins and jenkins-2-plugins is now available for OpenShift Developer Tools and Services for OCP 4.13. Relevant releases/architectures: OpenShift Developer Tools and Services for OCP 4.13 for RHEL 8 - noarch 3. Description: Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Security Fix(es): * apache-commons-text: variable interpolation RCE (CVE-2022-42889) * google-oauth-client: missing PKCE support in accordance with the RFC for OAuth 2.0 for Native Apps can lead to improper authorization (CVE-2020-7692) * jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin (CVE-2023-24422) * kubernetes-client: Insecure deserialization in unmarshalYaml method (CVE-2021-4178) * jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode (CVE-2021-46877) * springframework: Authorization Bypass in RegexRequestMatcher (CVE-2022-22978) * xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40151) * woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40152) * Apache Commons FileUpload: FileUpload DoS with excessive parts (CVE-2023-24998) * jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin (CVE-2023-25761) * jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin (CVE-2023-25762) * Jenkins: Denial of Service attack (CVE-2023-27900) * Jenkins: Denial of Service attack (CVE-2023-27901) * Jenkins: Workspace temporary directories accessible through directory browser (CVE-2023-27902) * Jenkins: Information disclosure through error stack traces related to agents (CVE-2023-27904) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/): 1856376 - CVE-2020-7692 google-oauth-client: missing PKCE support in accordance with the RFC for OAuth 2.0 for Native Apps can lead to improper authorization 2034388 - CVE-2021-4178 kubernetes-client: Insecure deserialization in unmarshalYaml method 2087606 - CVE-2022-22978 springframework: Authorization Bypass in RegexRequestMatcher 2134291 - CVE-2022-40152 woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks 2134292 - CVE-2022-40151 xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks 2135435 - CVE-2022-42889 apache-commons-text: variable interpolation RCE 2164278 - CVE-2023-24422 jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin 2170039 - CVE-2023-25761 jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin 2170041 - CVE-2023-25762 jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin 2172298 - CVE-2023-24998 Apache Commons FileUpload: FileUpload DoS with excessive parts 2177630 - CVE-2023-27902 Jenkins: Workspace temporary directories accessible through directory browser 2177634 - CVE-2023-27904 Jenkins: Information disclosure through error stack traces related to agents 2177638 - CVE-2023-27900 Jenkins: Denial of Service attack 2177646 - CVE-2023-27901 Jenkins: Denial of Service attack 2185707 - CVE-2021-46877 jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode 6. JIRA issues fixed (https://issues.jboss.org/): PITEAM-10 - Release 4.13 Jenkins agent image PITEAM-9 - Release 4.13 Jenkins image 7. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202305-37 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Low Title: Apache Tomcat: Multiple Vulnerabilities Date: May 30, 2023 Bugs: #878911, #889596, #896370, #907387 ID: 202305-37 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been found in Apache Tomcat, the worst of which could result in denial of service. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Apache Tomcat users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/tomcat-10.1.8" References ========= [ 1 ] CVE-2022-42252 https://nvd.nist.gov/vuln/detail/CVE-2022-42252 [ 2 ] CVE-2022-45143 https://nvd.nist.gov/vuln/detail/CVE-2022-45143 [ 3 ] CVE-2023-24998 https://nvd.nist.gov/vuln/detail/CVE-2023-24998 [ 4 ] CVE-2023-28709 https://nvd.nist.gov/vuln/detail/CVE-2023-28709 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202305-37 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . The purpose of this text-only errata is to inform you about the security issues fixed. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Web Server 5.7.4 release and security update Advisory ID: RHSA-2023:4909-01 Product: Red Hat JBoss Web Server Advisory URL: https://access.redhat.com/errata/RHSA-2023:4909 Issue date: 2023-09-04 CVE Names: CVE-2022-24963 CVE-2023-24998 CVE-2023-28708 CVE-2023-28709 ==================================================================== 1. Summary: An update is now available for Red Hat JBoss Web Server 5.7.4 on Red Hat Enterprise Linux versions 7, 8, and 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss Web Server 5.7 for RHEL 7 Server - noarch, x86_64 Red Hat JBoss Web Server 5.7 for RHEL 8 - noarch, x86_64 Red Hat JBoss Web Server 5.7 for RHEL 9 - noarch, x86_64 3. Description: Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This release of Red Hat JBoss Web Server 5.7.4 serves as a replacement for Red Hat JBoss Web Server 5.7.3. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References section. Security Fix(es): * apr: integer overflow/wraparound in apr_encode (CVE-2022-24963) * Apache Commons FileUpload: FileUpload DoS with excessive parts (CVE-2023-24998) * tomcat: not including the secure attribute causes information disclosure (CVE-2023-28708) * tomcat: Fix for CVE-2023-24998 was incomplete (CVE-2023-28709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files). For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2169465 - CVE-2022-24963 apr: integer overflow/wraparound in apr_encode 2172298 - CVE-2023-24998 Apache Commons FileUpload: FileUpload DoS with excessive parts 2180856 - CVE-2023-28708 tomcat: not including the secure attribute causes information disclosure 2210321 - CVE-2023-28709 tomcat: Fix for CVE-2023-24998 was incomplete 6. Package List: Red Hat JBoss Web Server 5.7 for RHEL 7 Server: Source: jws5-tomcat-9.0.62-15.redhat_00013.1.el7jws.src.rpm jws5-tomcat-native-1.2.31-15.redhat_15.el7jws.src.rpm noarch: jws5-tomcat-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-admin-webapps-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-docs-webapp-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-el-3.0-api-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-java-jdk11-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-java-jdk8-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-javadoc-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-jsp-2.3-api-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-lib-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-selinux-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-servlet-4.0-api-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm jws5-tomcat-webapps-9.0.62-15.redhat_00013.1.el7jws.noarch.rpm x86_64: jws5-tomcat-native-1.2.31-15.redhat_15.el7jws.x86_64.rpm jws5-tomcat-native-debuginfo-1.2.31-15.redhat_15.el7jws.x86_64.rpm Red Hat JBoss Web Server 5.7 for RHEL 8: Source: jws5-tomcat-9.0.62-15.redhat_00013.1.el8jws.src.rpm jws5-tomcat-native-1.2.31-15.redhat_15.el8jws.src.rpm noarch: jws5-tomcat-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-admin-webapps-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-docs-webapp-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-el-3.0-api-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-javadoc-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-jsp-2.3-api-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-lib-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-selinux-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-servlet-4.0-api-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm jws5-tomcat-webapps-9.0.62-15.redhat_00013.1.el8jws.noarch.rpm x86_64: jws5-tomcat-native-1.2.31-15.redhat_15.el8jws.x86_64.rpm jws5-tomcat-native-debuginfo-1.2.31-15.redhat_15.el8jws.x86_64.rpm Red Hat JBoss Web Server 5.7 for RHEL 9: Source: jws5-tomcat-9.0.62-15.redhat_00013.1.el9jws.src.rpm jws5-tomcat-native-1.2.31-15.redhat_15.el9jws.src.rpm noarch: jws5-tomcat-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-admin-webapps-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-docs-webapp-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-el-3.0-api-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-javadoc-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-jsp-2.3-api-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-lib-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-selinux-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-servlet-4.0-api-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm jws5-tomcat-webapps-9.0.62-15.redhat_00013.1.el9jws.noarch.rpm x86_64: jws5-tomcat-native-1.2.31-15.redhat_15.el9jws.x86_64.rpm jws5-tomcat-native-debuginfo-1.2.31-15.redhat_15.el9jws.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-24963 https://access.redhat.com/security/cve/CVE-2023-24998 https://access.redhat.com/security/cve/CVE-2023-28708 https://access.redhat.com/security/cve/CVE-2023-28709 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJk9dawAAoJENzjgjWX9erE1ycQAIwG6w749gWsv0nN3TgCLSn+ Ag1rdPKnc9K0BEer5aj3UZWq0ILQ0U2xkIV/+f03asPHSKehS0xAVAoTOB9eqDgB f7rcxV6tDwkkOgEHlCQZXle5CzMmIIuAmzQoRI855sl3fo7m1s9w/XGfM9TuwANu AAXKNZUc1EOtCzwQPbJ+RqwxXhiZvwaD1cXa/PtNmrmcFeQPjwZUTwWrs5KcDG/P CCIugcTaD8lCFRQFHtF+GXY9A1xzQ4sgGBeSa2+MRLV2e5nVGjby+1ydLIhThdvl 7bD+wtI7WOQkVI1ZrfiVuYU6gmQB1YoaYz3l8bjY+PvxoXANIDWI2y9QzLvjHRdX Q2DraXW6xMw0utFtFe5AiLevPH18VwBsdyUMOk8hpTQsRkw/Is7rIcHstucGJYSI CBVloQ8FbPXPUlTw4eYSr22c3bEyJKTACJIN+badVjzUlu7zewqF7g8BHXJGFIfT pwyfxOUfvAvn0qD8NvwE64yQ1pCIqcq/ffxliJp98cn86VrQ+H6+hwmxWOU1yoxe jyON4uVUE+IcaPPP84SUyGZW+ZgZjrdkBv4OaBsMvQweIPXLk54/dkgDtdOMF6EJ 3AX0KKqoSTFWJ7i64DWturuhAFRTdqkxeItLWM5LMo0FKsZur8efbRRnSHQhNUib PKxvfGMcijaSUTJ0s70k =7k// -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . CVE-2023-24998 Denial of service. CVE-2023-41080 Open redirect. If the ROOT (default) web application is configured to use FORM authentication then it is possible that a specially crafted URL could be used to trigger a redirect to an URL of the attackers choice. CVE-2023-42795 Information Disclosure. When recycling various internal objects, including the request and the response, prior to re-use by the next request/response, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. CVE-2023-44487 DoS caused by HTTP/2 frame overhead (Rapid Reset Attack) CVE-2023-45648 Request smuggling. Tomcat did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. For the oldstable distribution (bullseye), these problems have been fixed in version 9.0.43-2~deb11u7. We recommend that you upgrade your tomcat9 packages. For the detailed security status of tomcat9 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tomcat9 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmUlyBRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeRBnhAAk1o0EDLnX1zaS0Xnz9jybhd9XdXat1HwZXvV3XFRGVXu5+r2bKH+KQjU 0GJ6koP3KDt10DrI8DzOq+9Msu0/TbPYAZKDHPjPYfcUqXRmwRrvTXtq5cbR5v3+ JxgJhiqjQYb1DYiDLC5iU+6aryrZg2ma1i81lG5v8N1TDfaCHzbZiMpyeYEABkd7 eKX3tzngoK9UaIgYVBxrjnM9bPRWnRFJRBMu/hs4VS6gxqzAaZT72Tcaf0Vf3t1s Es5IMgrhBC0Q2Amlm3N5z37p0nlhnJdNC3dAHetRCy92g9/KsjB/1BZfYY7rM8wV WwvB5WwQ0T4eRqKmc8yY86sUdfXkhPqz1oFDbnNgxtBjMm2z/of9pNEm+2NCpv9P 3MpCIKsEWiGH8+uleGuFhAHoWeUYjDNJjH1di6+PYZoBaEJ8eiXct/THBt/0nvFR Nh6AFDqi1Hi5/GdPK71eFRDsXOwgSuRg1ZRJtJP1W/dYEiczP89l0CM04PwxEAn2 dbE2ZCUQmIzQdng4OAHt+ze+QDini4HtoRJnQHq4P/QUIEQAE9C0hOIMMnrtpqIY A77Qa1bBVqDgLlhvSmpSrVigmfyXSpmtfc9G0KXcq5IAvr75jZ0PNuIk/VTyklYj e3g3nA1rbB1jlx6cvPqWBFItXW8800mJ0CXHb8EN8jKdB5BnooY= =6KYM -----END PGP SIGNATURE----- . The following data is constructed from data provided by Red Hat's json file at: https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_6570.json Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment

Trust: 2.43

sources: NVD: CVE-2023-24998 // JVNDB: JVNDB-2023-001220 // VULMON: CVE-2023-24998 // PACKETSTORM: 172574 // PACKETSTORM: 172624 // PACKETSTORM: 172140 // PACKETSTORM: 174475 // PACKETSTORM: 174474 // PACKETSTORM: 175070 // PACKETSTORM: 175549 // PACKETSTORM: 175724

AFFECTED PRODUCTS

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:apachemodel:commons fileuploadscope:ltversion:1.5

Trust: 1.0

vendor:apachemodel:commons fileuploadscope:eqversion:1.0

Trust: 1.0

vendor:apachemodel:commons fileuploadscope:gteversion:1.0

Trust: 1.0

vendor:日本電気model:nec advanced analytics platform modelerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - smart device managerscope: - version: -

Trust: 0.8

vendor:日本電気model:neoface monitorscope: - version: -

Trust: 0.8

vendor:日立model:job management partner 1/it desktop management 2 - managerscope: - version: -

Trust: 0.8

vendor:日立model:hitachi tuning managerscope: - version: -

Trust: 0.8

vendor:apachemodel:tomcatscope: - version: -

Trust: 0.8

vendor:日本電気model:nec information assessment systemscope: - version: -

Trust: 0.8

vendor:日本電気model:enterpriseidentitymanagerscope: - version: -

Trust: 0.8

vendor:日本電気model:nec 自動応答scope: - version: -

Trust: 0.8

vendor:日本電気model:websam it process managementscope: - version: -

Trust: 0.8

vendor:日立model:jp1/performance managementscope: - version: -

Trust: 0.8

vendor:apachemodel:commons fileuploadscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - managerscope: - version: -

Trust: 0.8

vendor:日本電気model:webotx application serverscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management - managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - operations directorscope: - version: -

Trust: 0.8

vendor:日本電気model:esmpro/servermanagerscope: - version: -

Trust: 0.8

vendor:日立model:job management partner 1/it desktop management - managerscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive pfscope: - version: -

Trust: 0.8

vendor:日本電気model:actsecure ポータルscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-001220 // NVD: CVE-2023-24998

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-24998
value: HIGH

Trust: 1.0

NVD: CVE-2023-24998
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-1610
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2023-24998
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2023-24998
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-001220 // CNNVD: CNNVD-202302-1610 // NVD: CVE-2023-24998

PROBLEMTYPE DATA

problemtype:CWE-770

Trust: 1.0

problemtype:Determination of boundary conditions (CWE-193) [ others ]

Trust: 0.8

problemtype: Allocation of resources without limits or throttling (CWE-770) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-001220 // NVD: CVE-2023-24998

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202302-1610

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202302-1610

PATCH

title:hitachi-sec-2024-119url:https://commons.apache.org/proper/commons-fileupload/security-reports.html#Fixed_in_Apache_Commons_FileUpload_1.5

Trust: 0.8

title:Apache Commons FileUpload Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=227328

Trust: 0.6

title:Debian CVElist Bug Report Logs: libcommons-fileupload-java: CVE-2023-24998url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=d5c27d5122389b2993bab30e55fe65cf

Trust: 0.1

title:Red Hat: url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2023-24998

Trust: 0.1

sources: VULMON: CVE-2023-24998 // JVNDB: JVNDB-2023-001220 // CNNVD: CNNVD-202302-1610

EXTERNAL IDS

db:NVDid:CVE-2023-24998

Trust: 4.1

db:OPENWALLid:OSS-SECURITY/2023/05/22/1

Trust: 1.6

db:ICS CERTid:ICSA-24-046-15

Trust: 0.8

db:JVNid:JVNVU91198149

Trust: 0.8

db:JVNid:JVNVU91253151

Trust: 0.8

db:JVNDBid:JVNDB-2023-001220

Trust: 0.8

db:AUSCERTid:ESB-2023.3457

Trust: 0.6

db:AUSCERTid:ESB-2023.2030

Trust: 0.6

db:AUSCERTid:ESB-2023.3098

Trust: 0.6

db:AUSCERTid:ESB-2023.1629

Trust: 0.6

db:AUSCERTid:ESB-2023.3839

Trust: 0.6

db:AUSCERTid:ESB-2023.2979

Trust: 0.6

db:AUSCERTid:ESB-2023.3596

Trust: 0.6

db:AUSCERTid:ESB-2023.3113

Trust: 0.6

db:AUSCERTid:ESB-2023.3425

Trust: 0.6

db:AUSCERTid:ESB-2023.1590

Trust: 0.6

db:AUSCERTid:ESB-2023.1527

Trust: 0.6

db:AUSCERTid:ESB-2023.1085

Trust: 0.6

db:AUSCERTid:ESB-2023.1526

Trust: 0.6

db:AUSCERTid:ESB-2023.1468

Trust: 0.6

db:CNNVDid:CNNVD-202302-1610

Trust: 0.6

db:VULMONid:CVE-2023-24998

Trust: 0.1

db:PACKETSTORMid:172574

Trust: 0.1

db:PACKETSTORMid:172624

Trust: 0.1

db:PACKETSTORMid:172140

Trust: 0.1

db:PACKETSTORMid:174475

Trust: 0.1

db:PACKETSTORMid:174474

Trust: 0.1

db:PACKETSTORMid:175070

Trust: 0.1

db:PACKETSTORMid:175549

Trust: 0.1

db:PACKETSTORMid:175724

Trust: 0.1

sources: VULMON: CVE-2023-24998 // JVNDB: JVNDB-2023-001220 // PACKETSTORM: 172574 // PACKETSTORM: 172624 // PACKETSTORM: 172140 // PACKETSTORM: 174475 // PACKETSTORM: 174474 // PACKETSTORM: 175070 // PACKETSTORM: 175549 // PACKETSTORM: 175724 // CNNVD: CNNVD-202302-1610 // NVD: CVE-2023-24998

REFERENCES

url:https://lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy

Trust: 1.7

url:https://security.gentoo.org/glsa/202305-37

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2023/05/22/1

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2023-24998

Trust: 1.5

url:https://access.redhat.com/security/cve/cve-2023-24998

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-28709

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html

Trust: 1.0

url:https://www.debian.org/security/2023/dsa-5522

Trust: 1.0

url:http://jvn.jp/vu/jvnvu91253151/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91198149/index.html

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-15

Trust: 0.8

url:https://access.redhat.com/articles/11258

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.2030

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1590

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1085

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3098

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3457

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1468

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3425

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3596

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3113

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3839

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1629

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2023-24998/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1526

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.2979

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1527

Trust: 0.6

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-40152

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-40151

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-24963

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-28708

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-24963

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-28709

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-28708

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/770.html

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031733

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-46877

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3299

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-25761

Trust: 0.1

url:https://issues.jboss.org/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-27904

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-7692

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25761

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-27902

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22978

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42889

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-27900

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-24422

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-27902

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-25762

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-27901

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-7692

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22978

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-40152

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-40151

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42889

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-24422

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25762

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-46877

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-27901

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-27900

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-45143

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42252

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:2100

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31777

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-4492

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1370

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38648

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38398

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38749

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40146

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41852

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41853

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37533

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40156

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41854

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-31777

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42004

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41966

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-22602

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37533

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1436

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-40146

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38648

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38751

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38398

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-37866

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41881

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38752

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42003

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-20860

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38749

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-39368

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=red.hat.integration&version=2023-q2

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41704

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25857

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40150

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42890

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-37865

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-37865

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25857

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-33681

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-33681

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38751

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-39368

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-20863

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-20861

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38752

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-37866

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38750

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:4910

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-28331

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=webserver&version=5.7

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28331

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:4909

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-44487

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-45648

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-41080

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-42795

Trust: 0.1

url:https://security-tracker.debian.org/tracker/tomcat9

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:6570

Trust: 0.1

url:https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_6570.json

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=2173874

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=2189676

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:7065

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=2172298

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=2210321

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=2180856

Trust: 0.1

url:https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_7065.json

Trust: 0.1

sources: VULMON: CVE-2023-24998 // JVNDB: JVNDB-2023-001220 // PACKETSTORM: 172574 // PACKETSTORM: 172624 // PACKETSTORM: 172140 // PACKETSTORM: 174475 // PACKETSTORM: 174474 // PACKETSTORM: 175070 // PACKETSTORM: 175549 // PACKETSTORM: 175724 // CNNVD: CNNVD-202302-1610 // NVD: CVE-2023-24998

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 172574 // PACKETSTORM: 172140 // PACKETSTORM: 174475 // PACKETSTORM: 174474 // PACKETSTORM: 175549 // PACKETSTORM: 175724

SOURCES

db:VULMONid:CVE-2023-24998
db:JVNDBid:JVNDB-2023-001220
db:PACKETSTORMid:172574
db:PACKETSTORMid:172624
db:PACKETSTORMid:172140
db:PACKETSTORMid:174475
db:PACKETSTORMid:174474
db:PACKETSTORMid:175070
db:PACKETSTORMid:175549
db:PACKETSTORMid:175724
db:CNNVDid:CNNVD-202302-1610
db:NVDid:CVE-2023-24998

LAST UPDATE DATE

2024-11-20T22:25:38.815000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-24998date:2023-02-23T00:00:00
db:JVNDBid:JVNDB-2023-001220date:2024-05-29T07:11:00
db:CNNVDid:CNNVD-202302-1610date:2023-07-10T00:00:00
db:NVDid:CVE-2023-24998date:2024-02-16T19:11:10.163

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-24998date:2023-02-20T00:00:00
db:JVNDBid:JVNDB-2023-001220date:2023-02-22T00:00:00
db:PACKETSTORMid:172574date:2023-05-25T15:06:23
db:PACKETSTORMid:172624date:2023-05-30T16:32:27
db:PACKETSTORMid:172140date:2023-05-04T14:33:07
db:PACKETSTORMid:174475date:2023-09-04T17:29:56
db:PACKETSTORMid:174474date:2023-09-04T17:29:45
db:PACKETSTORMid:175070date:2023-10-11T16:46:58
db:PACKETSTORMid:175549date:2023-11-13T21:01:39
db:PACKETSTORMid:175724date:2023-11-15T14:07:20
db:CNNVDid:CNNVD-202302-1610date:2023-02-20T00:00:00
db:NVDid:CVE-2023-24998date:2023-02-20T16:15:10.423