First published: Tue Oct 10 2023(Updated: )
Incomplete Cleanup vulnerability in Apache Tomcat. The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, in progress refactoring that exposed a potential denial of service on Windows if a web application opened a stream for an uploaded file but failed to close the stream. The file would never be deleted from disk creating the possibility of an eventual denial of service due to the disk being full. Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | >=8.5.85<8.5.94 | |
Apache Tomcat | >=9.0.70<9.0.81 | |
maven/org.apache.tomcat:tomcat | >=8.5.85<8.5.94 | 8.5.94 |
maven/org.apache.tomcat:tomcat | >=9.0.70<9.0.81 | 9.0.81 |
redhat/tomcat | <9.0.81 | 9.0.81 |
redhat/tomcat | <8.5.94 | 8.5.94 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42794 is an incomplete cleanup vulnerability in Apache Tomcat that can result in a denial of service due to the accumulation of temporary files on Windows.
Apache Tomcat versions 8.5.85 through 8.5.93 and 9.0.70 through 9.0.80 are affected by CVE-2023-42794.
CVE-2023-42794 can be exploited by a web application opening a large number of file upload requests on Windows, leading to the accumulation of temporary files and a potential denial of service.
To fix CVE-2023-42794, upgrade to Apache Tomcat version 8.5.94 or 9.0.81.
You can find more information about CVE-2023-42794 on the Openwall, Apache, and NIST websites using the provided references.