#VU101814 Permissions, Privileges, and Access Controls in Apache Tomcat - CVE-2024-50379
Published: December 17, 2024 / Updated: June 20, 2025
Apache Tomcat
Apache Foundation
Description
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to missing access restrictions to the default servlet. If the default servlet is write enabled (readonly initialisation parameter set to the non-default value of false) for a case insensitive file system, concurrent read and upload under load of the same file can bypass Tomcat's case sensitivity checks and cause an uploaded file to be treated as a JSP leading to remote code execution.
Remediation
External links
- https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.98
- https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.34
- https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.2
- https://lists.apache.org/thread/y6lj6q1xnp822g6ro70tn19sgtjmr80r
- https://lists.apache.org/thread/42vjtxt4n60ydko8l69vlwlcwr0vdh7z