CVE-2023-24998
Java vulnerability analysis and mitigation

Overview

Apache Commons FileUpload before version 1.5, as used in Apache Tomcat, contains a vulnerability identified as CVE-2023-24998. The vulnerability was discovered in February 2023 and affects the file upload functionality where the system does not limit the number of request parts to be processed. This vulnerability impacts Apache Tomcat versions before 8.5.88, 9.0.74, and 10.1.8, which use a packaged renamed copy of Apache Commons FileUpload to provide file upload functionality defined in the Jakarta Servlet specification (NVD, Debian Security).

Technical details

The vulnerability stems from the absence of limits on the number of request parts that can be processed during file uploads. The new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. The vulnerability has been assigned a CVSS score of 7.5 (HIGH) with a vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NetApp Security).

Impact

When exploited, this vulnerability could allow an attacker to trigger a Denial of Service (DoS) condition through a malicious upload or series of uploads. Since there is no limit to the number of request parts processed, an attacker could prevent other systems, applications, or processes from accessing the same type of resource (Debian Security).

Mitigation and workarounds

The primary mitigation is to upgrade to patched versions: Apache Tomcat 8.5.88 or later, 9.0.74 or later, or 10.1.8 or later. For the Commons FileUpload component, upgrading to version 1.5 or later is recommended. Additionally, administrators should explicitly configure the FileUploadBase#setFileCountMax option to limit the number of request parts that can be processed (Gentoo Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management