支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2024-50379 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Apache Tomcat: RCE due to TOCTOU issue in JSP compilation
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration). This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
检查时间与使用时间(TOCTOU)的竞争条件
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Apache Tomcat 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。用于实现对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat存在安全漏洞。攻击者利用该漏洞可以在不区分大小写的文件系统上远程执行代码。以下版本受到影响:11.0.0-M1版本和11.0.1版本、10.1.0-M1版本至10.1.33版本和9.0.0.M1版本至9.0.97版本。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
Apache Software FoundationApache Tomcat 11.0.0-M1 ~ 11.0.1 -
二、漏洞 CVE-2024-50379 的公开POC
#POC 描述源链接神龙链接
1Nonehttps://github.com/v3153/CVE-2024-50379-POCPOC详情
2Nonehttps://github.com/yiliufeng168/CVE-2024-50379-POCPOC详情
3Repositorio para alojar un template de Nuclei para probar el CVE-2024-50379 (en fase de prueba)https://github.com/JFOZ1010/Nuclei-Template-CVE-2024-50379POC详情
4Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本https://github.com/iSee857/CVE-2024-50379-PoCPOC详情
5CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs).https://github.com/Alchemist3dot14/CVE-2024-50379POC详情
6RCE through a race condition in Apache Tomcathttps://github.com/ph0ebus/Tomcat-CVE-2024-50379-PocPOC详情
7tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exphttps://github.com/SleepingBag945/CVE-2024-50379POC详情
8CVE-2024-50379利用https://github.com/dear-cell/CVE-2024-50379POC详情
9CVE-2024-50379-exphttps://github.com/lizhianyuguangming/CVE-2024-50379-expPOC详情
10This repository contains a Python script designed to exploit CVE-2024-50379, a vulnerability that allows attackers to upload a JSP shell to a vulnerable server and execute arbitrary commands remotely. This exploit is particularly useful when the /uploads directory is either unprotected or not present on the target server.https://github.com/dragonked2/CVE-2024-50379-POCPOC详情
11Testing the latset Apache Tomcat CVE-2024-50379 Vulnhttps://github.com/bigb0x/CVE-2024-50379POC详情
12ExploitDB CVE-2024-50379 a vulnerability that enables attackers to upload a JSP shell to a vulnerable server and execute commands remotely. The exploit is especially effective when the /uploads directory is either unprotected or missing on the target server.https://github.com/pwnosec/CVE-2024-50379POC详情
13Testing the latset Apache Tomcat CVE-2024-50379 Vulnhttps://github.com/dkstar11q/CVE-2024-50379-nucleiPOC详情
14tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exphttps://github.com/paltrybelly/CVE-2024-50379POC详情
15tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exphttps://github.com/shoddykilom/CVE-2024-50379POC详情
16tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exphttps://github.com/unkemptpanc/CVE-2024-50379POC详情
17tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exphttps://github.com/whimsicalsubw/CVE-2024-50379POC详情
18tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exphttps://github.com/carefreegarb/CVE-2024-50379POC详情
19Nonehttps://github.com/thunww/CVE-2024-50379POC详情
20CVE-2024-50379-exphttps://github.com/gomtaengi/CVE-2024-50379-expPOC详情
21Cve exploiting https://github.com/Yuri08loveElaina/CVE-2024-50379-POCPOC详情
22Nonehttps://github.com/Yuri08loveElaina/CVE-2024-50379POC详情
23Time-of-check Time-of-use (TOCTOU) Race Condition vulnerabilityhttps://github.com/radzek15/CVE-2024-50379-TOCTOUPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2024-50379 的情报信息
Please 登录 to view more intelligence information
四、漏洞 CVE-2024-50379 的评论

暂无评论


发表评论