Skip to content

Commit eb4b481

Browse files
1 parent 08dc98f commit eb4b481

1 file changed

Lines changed: 7 additions & 11 deletions

File tree

advisories/github-reviewed/2024/12/GHSA-653p-vg55-5652/GHSA-653p-vg55-5652.json

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,24 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-653p-vg55-5652",
4-
"modified": "2025-11-03T21:31:45Z",
4+
"modified": "2025-11-03T21:32:47Z",
55
"published": "2024-12-17T15:31:43Z",
66
"aliases": [
77
"CVE-2024-54677"
88
],
99
"summary": "Apache Tomcat Uncontrolled Resource Consumption vulnerability",
10-
"details": "Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.",
10+
"details": "Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.\n\nMitigation: This vulnerability does not affect core Apache Tomcat server components (tomcat-catalina, tomcat-coyote, tomcat-embed-core, etc.). Removing the `webapps/examples/` directory in production environments — as recommended by the Apache Tomcat Security Considerations documentation (https://tomcat.apache.org/tomcat-9.0-doc/security-howto.html) — eliminates the attack surface entirely.",
1111
"severity": [
12-
{
13-
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
15-
},
1612
{
1713
"type": "CVSS_V4",
18-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"
1915
}
2016
],
2117
"affected": [
2218
{
2319
"package": {
2420
"ecosystem": "Maven",
25-
"name": "org.apache.tomcat:tomcat-catalina"
21+
"name": "org.apache.tomcat:tomcat"
2622
},
2723
"ranges": [
2824
{
@@ -41,7 +37,7 @@
4137
{
4238
"package": {
4339
"ecosystem": "Maven",
44-
"name": "org.apache.tomcat:tomcat-catalina"
40+
"name": "org.apache.tomcat:tomcat"
4541
},
4642
"ranges": [
4743
{
@@ -60,7 +56,7 @@
6056
{
6157
"package": {
6258
"ecosystem": "Maven",
63-
"name": "org.apache.tomcat:tomcat-catalina"
59+
"name": "org.apache.tomcat:tomcat"
6460
},
6561
"ranges": [
6662
{
@@ -79,7 +75,7 @@
7975
{
8076
"package": {
8177
"ecosystem": "Maven",
82-
"name": "org.apache.tomcat:tomcat-catalina"
78+
"name": "org.apache.tomcat:tomcat"
8379
},
8480
"ranges": [
8581
{

0 commit comments

Comments
 (0)