cve/2023/CVE-2023-24998.md

24 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-24998](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24998)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Commons%20FileUpload&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Tomcat&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2011.0.0-M1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&color=brighgreen)
### Description
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads.Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Threekiii/CVE
- https://github.com/muneebaashiq/MBProjects
- https://github.com/nice1st/CVE-2023-24998
- https://github.com/nomi-sec/PoC-in-GitHub