Thiru
Dec 19, 2024

According to the Apache Tomcat documentation (https://tomcat.apache.org/security-9.html),

This vulnerability would only be exploitable "If the default servlet is write-enabled (i.e., the readonly initialization parameter is set to the non-default value of false) on a case-insensitive file system."

But, by default, the readonly parameter is true for the DefaultServlet (Reference: https://tomcat.apache.org/tomcat-9.0-doc/default-servlet.html).

Therefore, this vulnerability should not impact default Tomcat installations.

Reference: https://lists.apache.org/thread/vzhfof75z4oyymls5wooz54h2ddvzyrn

Additionally, the example provided in the above article does not demonstrate exploitation of the actual vulnerability. The issue (CVE-2024-50379) arises due to a Time-of-Check Time-of-Use (TOCTOU) race condition in the Tomcat code, specifically in WebResourceLockSet.java.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

No responses yet

Write a response