
The Apache Software Foundation has released patches to mitigate two newly discovered vulnerabilities in Apache Tomcat, an extensively used open-source web server and servlet container. These vulnerabilities could potentially jeopardize systems and compromise sensitive data, highlighting the importance of timely updates and security measures.
CVE-2024-50379: Remote Code Execution (RCE)
This vulnerability arises in the default servlet and becomes exploitable under specific conditions, particularly when the servlet is configured to allow write access, and the underlying file system is case-insensitive. In such scenarios, attackers could upload malicious files disguised as legitimate ones. This manipulation could enable attackers to execute arbitrary code on the affected system, leading to a remote code execution (RCE) scenario. The ability to execute code remotely can potentially allow attackers to take full control of the system, access sensitive data, modify system configurations, and perform other malicious activities.
CVE-2024-54677: Denial-of-Service (DoS)
This vulnerability that impacts the “examples” web application bundled with Apache Tomcat. This vulnerability can be exploited by attackers who upload excessive amounts of data, causing the server to run out of memory and result in an OutOfMemoryError. It remains significant as it can lead to server crashes and disrupt the availability of services hosted on the Tomcat server.
Mitigation and Recommendations
To address these vulnerabilities, the Apache Software Foundation has released updates for Apache Tomcat. Users of Apache Tomcat are strongly encouraged to upgrade to the latest secure versions: 11.0.2, 10.1.34, or 9.0.98. These versions include patches that fix both CVE-2024-50379 and CVE-2024-54677. In addition to applying these updates, users should review their Tomcat server configurations. It is advisable to ensure that the default servlet is not configured to allow write access unless absolutely necessary, and to consider the implications of case-insensitive file systems in their deployment environments.
Conclusion
These updates are vital for maintaining the security and reliability of systems that rely on Apache Tomcat. By promptly applying the recommended patches and reviewing security configurations, organizations can protect their infrastructure from potential exploits and maintain the integrity and availability of their web applications and services. This incident underscores the ongoing need for vigilance in cybersecurity practices, including regular updates and adherence to security best practices.

