Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-50379— Apache Tomcat: RCE due to TOCTOU issue in JSP compilation

EPSS 84.98% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-50379

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache Tomcat: RCE due to TOCTOU issue in JSP compilation
Source: NVD (National Vulnerability Database)
Vulnerability Description
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration). This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
检查时间与使用时间(TOCTOU)的竞争条件
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Tomcat 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。用于实现对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat存在安全漏洞。攻击者利用该漏洞可以在不区分大小写的文件系统上远程执行代码。以下版本受到影响:11.0.0-M1版本和11.0.1版本、10.1.0-M1版本至10.1.33版本和9.0.0.M1版本至9.0.97版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache Tomcat 11.0.0-M1 ~ 11.0.1 -

II. Public POCs for CVE-2024-50379

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/v3153/CVE-2024-50379-POCPOC Details
2Nonehttps://github.com/yiliufeng168/CVE-2024-50379-POCPOC Details
3Repositorio para alojar un template de Nuclei para probar el CVE-2024-50379 (en fase de prueba)https://github.com/JFOZ1010/Nuclei-Template-CVE-2024-50379POC Details
4Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本https://github.com/iSee857/CVE-2024-50379-PoCPOC Details
5CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs).https://github.com/Alchemist3dot14/CVE-2024-50379POC Details
6RCE through a race condition in Apache Tomcathttps://github.com/ph0ebus/Tomcat-CVE-2024-50379-PocPOC Details
7tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exphttps://github.com/SleepingBag945/CVE-2024-50379POC Details
8CVE-2024-50379利用https://github.com/dear-cell/CVE-2024-50379POC Details
9CVE-2024-50379-exphttps://github.com/lizhianyuguangming/CVE-2024-50379-expPOC Details
10This repository contains a Python script designed to exploit CVE-2024-50379, a vulnerability that allows attackers to upload a JSP shell to a vulnerable server and execute arbitrary commands remotely. This exploit is particularly useful when the /uploads directory is either unprotected or not present on the target server.https://github.com/dragonked2/CVE-2024-50379-POCPOC Details
11Testing the latset Apache Tomcat CVE-2024-50379 Vulnhttps://github.com/bigb0x/CVE-2024-50379POC Details
12ExploitDB CVE-2024-50379 a vulnerability that enables attackers to upload a JSP shell to a vulnerable server and execute commands remotely. The exploit is especially effective when the /uploads directory is either unprotected or missing on the target server.https://github.com/pwnosec/CVE-2024-50379POC Details
13Testing the latset Apache Tomcat CVE-2024-50379 Vulnhttps://github.com/dkstar11q/CVE-2024-50379-nucleiPOC Details
14tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exphttps://github.com/paltrybelly/CVE-2024-50379POC Details
15tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exphttps://github.com/shoddykilom/CVE-2024-50379POC Details
16tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exphttps://github.com/unkemptpanc/CVE-2024-50379POC Details
17tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exphttps://github.com/whimsicalsubw/CVE-2024-50379POC Details
18tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exphttps://github.com/carefreegarb/CVE-2024-50379POC Details
19Nonehttps://github.com/thunww/CVE-2024-50379POC Details
20CVE-2024-50379-exphttps://github.com/gomtaengi/CVE-2024-50379-expPOC Details
21Cve exploiting https://github.com/Yuri08loveElaina/CVE-2024-50379-POCPOC Details
22Nonehttps://github.com/Yuri08loveElaina/CVE-2024-50379POC Details
23Time-of-check Time-of-use (TOCTOU) Race Condition vulnerabilityhttps://github.com/radzek15/CVE-2024-50379-TOCTOUPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-50379

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-50379

No comments yet


Leave a comment