First published: Mon Nov 18 2024(Updated: )
Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat-catalina | >=11.0.0-M1<=11.0.0-M26 | 11.0.1 |
maven/org.apache.tomcat:tomcat-catalina | >=10.1.0-M1<10.1.30 | 10.1.30 |
maven/org.apache.tomcat:tomcat-catalina | <9.0.96 | 9.0.96 |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52316 has been classified as a moderate severity vulnerability.
To fix CVE-2024-52316, upgrade to Apache Tomcat version 11.0.1, 10.1.30, or 9.0.96 depending on your current version.
Apache Tomcat versions earlier than 11.0.1, 10.1.30, and 9.0.96 are affected by CVE-2024-52316.
Yes, CVE-2024-52316 specifically affects the authentication process in Apache Tomcat when using custom Jakarta Authentication components.
CVE-2024-52316 is an unchecked error condition vulnerability that can occur during the authentication process.