Bug 2210321 (CVE-2023-28709) - CVE-2023-28709 tomcat: Fix for CVE-2023-24998 was incomplete
Summary: CVE-2023-28709 tomcat: Fix for CVE-2023-24998 was incomplete
Keywords:
Status: VERIFIED
Alias: CVE-2023-28709
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2210322 2210323 2210627 2210628 2210629 2210630 2210631 2210632
Blocks: 2209054
TreeView+ depends on / blocked
 
Reported: 2023-05-26 15:18 UTC by Patrick Del Bello
Modified: 2024-03-08 18:04 UTC (History)
8 users (show)

Fixed In Version: Apache Tomcat 11.0.0-M5, Apache Tomcat 10.1.8, Apache Tomcat 9.0.74, Apache Tomcat 8.5.88
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Apache Tomcat due to an incomplete fix for CVE-2023-24998, which aims to limit the uploaded request parts that can be bypassed in a request. This issue may allow an attacker to use a malicious upload or series of uploads to trigger a denial of service.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:4909 0 None None None 2023-09-04 12:16:22 UTC
Red Hat Product Errata RHSA-2023:4910 0 None None None 2023-09-04 12:24:20 UTC
Red Hat Product Errata RHSA-2023:6570 0 None None None 2023-11-07 08:19:28 UTC
Red Hat Product Errata RHSA-2023:7065 0 None None None 2023-11-14 15:19:53 UTC

Description Patrick Del Bello 2023-05-26 15:18:22 UTC
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was       submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.

https://lists.apache.org/thread/7wvxonzwb7k9hx9jt3q33cmy7j97jo3j
http://www.openwall.com/lists/oss-security/2023/05/22/1

Comment 1 Patrick Del Bello 2023-05-26 15:21:09 UTC
Created tomcat tracking bugs for this issue:

Affects: epel-all [bug 2210323]
Affects: fedora-all [bug 2210322]

Comment 5 errata-xmlrpc 2023-09-04 12:16:21 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Web Server 5.7 on RHEL 7
  Red Hat JBoss Web Server 5.7 on RHEL 8
  Red Hat JBoss Web Server 5.7 on RHEL 9

Via RHSA-2023:4909 https://access.redhat.com/errata/RHSA-2023:4909

Comment 6 errata-xmlrpc 2023-09-04 12:24:18 UTC
This issue has been addressed in the following products:

  JWS 5.7.4 release

Via RHSA-2023:4910 https://access.redhat.com/errata/RHSA-2023:4910

Comment 7 Matus Madzin 2023-10-26 21:41:15 UTC
This CVE is fixed in builds tomcat-9.0.62-27.el8_9 and RHEL-9 with tomcat-9.0.62-37.el9_3

Comment 8 errata-xmlrpc 2023-11-07 08:19:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6570 https://access.redhat.com/errata/RHSA-2023:6570

Comment 9 errata-xmlrpc 2023-11-14 15:19:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:7065 https://access.redhat.com/errata/RHSA-2023:7065


Note You need to log in before you can comment on or make changes to this bug.