First published: Mon Feb 20 2023(Updated: )
A flaw was found in Apache Commons FileUpload, where it does not limit the number of parts being processed in a request. This issue may allow an attacker to use a malicious upload or series of uploads to trigger a denial of service. While Red Hat Satellite relies upon Apache Tomcat, it does not directly ship it. Tomcat is shipped with Red Hat Enterprise Linux and consumed by the Candlepin component of Satellite. Red Hat Satellite users are therefore advised to check the impact state of Red Hat Enterprise Linux, since any necessary fixes will be distributed through the platform.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <0:2.387.3.1684911776-3.el8 | 0:2.387.3.1684911776-3.el8 |
redhat/jws5-tomcat | <0:9.0.62-15.redhat_00013.1.el7 | 0:9.0.62-15.redhat_00013.1.el7 |
redhat/jws5-tomcat | <0:9.0.62-15.redhat_00013.1.el8 | 0:9.0.62-15.redhat_00013.1.el8 |
redhat/jws5-tomcat | <0:9.0.62-15.redhat_00013.1.el9 | 0:9.0.62-15.redhat_00013.1.el9 |
Apache Commons FileUpload | >=1.0<1.5 | |
Apache Commons FileUpload | =1.0-beta | |
debian/libcommons-fileupload-java | <=1.3.3-1<=1.4-1 | 1.4-2 |
debian/tomcat10 | 10.1.6-1+deb12u1 10.1.16-1 | |
debian/tomcat9 | <=9.0.31-1~deb10u6<=9.0.43-2~deb11u6 | 9.0.31-1~deb10u10 9.0.43-2~deb11u9 9.0.70-2 |
redhat/commons-fileupload | <1.5 | 1.5 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=9.0.0-M1<9.0.71 | 9.0.71 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=8.5.85<8.5.88 | 8.5.88 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=11.0.0-M2<11.0.0-M5 | 11.0.0-M5 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=10.1.0-M1<10.1.5 | 10.1.5 |
maven/org.apache.tomcat:tomcat-coyote | >=9.0.0-M1<9.0.71 | 9.0.71 |
maven/org.apache.tomcat:tomcat-coyote | >=8.5.85<8.5.88 | 8.5.88 |
maven/org.apache.tomcat:tomcat-coyote | >=11.0.0-M2<11.0.0-M5 | 11.0.0-M5 |
maven/org.apache.tomcat:tomcat-coyote | >=10.1.0-M1<10.1.5 | 10.1.5 |
maven/commons-fileupload:commons-fileupload | <1.5 | 1.5 |
IBM Cognos Controller | <=11.0.0 - 11.0.1 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =11.0 | |
>=1.0<1.5 | ||
=1.0-beta | ||
=9.0 | ||
=11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2023-24998.
The severity of CVE-2023-24998 is high.
CVE-2023-24998 can allow an attacker to use a malicious upload or series of uploads to trigger a denial of service.
To fix CVE-2023-24998 for Apache Commons FileUpload, upgrade to version 1.5.
To fix CVE-2023-24998 for IBM Sterling Secure Proxy, apply the relevant patch from IBM.
CVE-2023-24998 does not directly affect Red Hat Satellite.
You can find more information about CVE-2023-24998 at the following references: [CVE-2023-24998](https://www.cve.org/CVERecord?id=CVE-2023-24998), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-24998), [Apache Commons FileUpload Security Reports](https://commons.apache.org/proper/commons-fileupload/security-reports.html#Fixed_in_Apache_Commons_FileUpload_1.5), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2172298), [Red Hat Errata](https://access.redhat.com/errata/RHSA-2023:3299).