# Apache Tomcat:JSP 编译中 TOCTOU 问题导致的 RCE 漏洞
## 漏洞概述
Apache Tomcat在JSP编译过程中存在Time-of-check Time-of-use (TOCTOU)竞态条件漏洞,这允许在默认servlet启用写权限的情况下,在不区分大小写的文件系统上实现远程代码执行(RCE)。
## 影响版本
- 11.0.0-M1 到 11.0.1
- 10.1.0-M1 到 10.1.33
- 9.0.0.M1 到 9.0.97
## 漏洞细节
在Apache Tomcat中,当默认servlet启用写权限时(非默认配置),在不区分大小写的文件系统中处理JSP文件编译时存在竞态条件漏洞。攻击者可以利用此漏洞在目标系统上执行任意代码。
## 影响
建议用户升级到以下版本以修复此问题:
- 11.0.2
- 10.1.34
- 9.0.98
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | None | https://github.com/v3153/CVE-2024-50379-POC | POC详情 |
2 | None | https://github.com/yiliufeng168/CVE-2024-50379-POC | POC详情 |
3 | Repositorio para alojar un template de Nuclei para probar el CVE-2024-50379 (en fase de prueba) | https://github.com/JFOZ1010/Nuclei-Template-CVE-2024-50379 | POC详情 |
4 | Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本 | https://github.com/iSee857/CVE-2024-50379-PoC | POC详情 |
5 | CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs). | https://github.com/Alchemist3dot14/CVE-2024-50379 | POC详情 |
6 | RCE through a race condition in Apache Tomcat | https://github.com/ph0ebus/Tomcat-CVE-2024-50379-Poc | POC详情 |
7 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/SleepingBag945/CVE-2024-50379 | POC详情 |
8 | CVE-2024-50379利用 | https://github.com/dear-cell/CVE-2024-50379 | POC详情 |
9 | CVE-2024-50379-exp | https://github.com/lizhianyuguangming/CVE-2024-50379-exp | POC详情 |
10 | This repository contains a Python script designed to exploit CVE-2024-50379, a vulnerability that allows attackers to upload a JSP shell to a vulnerable server and execute arbitrary commands remotely. This exploit is particularly useful when the /uploads directory is either unprotected or not present on the target server. | https://github.com/dragonked2/CVE-2024-50379-POC | POC详情 |
11 | Testing the latset Apache Tomcat CVE-2024-50379 Vuln | https://github.com/bigb0x/CVE-2024-50379 | POC详情 |
12 | ExploitDB CVE-2024-50379 a vulnerability that enables attackers to upload a JSP shell to a vulnerable server and execute commands remotely. The exploit is especially effective when the /uploads directory is either unprotected or missing on the target server. | https://github.com/pwnosec/CVE-2024-50379 | POC详情 |
13 | Testing the latset Apache Tomcat CVE-2024-50379 Vuln | https://github.com/dkstar11q/CVE-2024-50379-nuclei | POC详情 |
14 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/paltrybelly/CVE-2024-50379 | POC详情 |
15 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/shoddykilom/CVE-2024-50379 | POC详情 |
16 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/unkemptpanc/CVE-2024-50379 | POC详情 |
17 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/whimsicalsubw/CVE-2024-50379 | POC详情 |
18 | tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp | https://github.com/carefreegarb/CVE-2024-50379 | POC详情 |
19 | None | https://github.com/thunww/CVE-2024-50379 | POC详情 |
标题: [SECURITY] CVE-2024-50379 Apache Tomcat - RCE via write-enabled default servlet-Apache Mail Archives -- 🔗来源链接
标签: vendor-advisory