First published: Mon Nov 18 2024(Updated: )
Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat-coyote | >=11.0.0-M23<11.0.0 | 11.0.0 |
maven/org.apache.tomcat:tomcat-coyote | >=10.1.27<10.1.31 | 10.1.31 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=11.0.0-M23<11.0.0 | 11.0.0 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=10.1.27<10.1.31 | 10.1.31 |
maven/org.apache.tomcat:tomcat-coyote | >=9.0.92<9.0.96 | 9.0.96 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=9.0.92<9.0.96 | 9.0.96 |
IBM ApplinX | <=11.1 | |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52317 is classified as a high severity vulnerability due to the potential for request and response mix-up between users.
To fix CVE-2024-52317, update Apache Tomcat to version 11.0.0, 10.1.31, or 9.0.96 depending on your installation.
CVE-2024-52317 affects Apache Tomcat versions from 11.0.0-M23 through 11.0.0-M26, 10.1.27 through 10.1.30, and 9.0.92 through 9.0.95.
Yes, CVE-2024-52317 involves an incorrect object recycling vulnerability specifically related to HTTP/2 requests.
Systems running vulnerable versions of Apache Tomcat and utilizing HTTP/2 protocols could be impacted by CVE-2024-52317.