cve/2023/CVE-2023-28709.md

19 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-28709](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28709)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Tomcat&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=11.0.0-M2%3C%3D%2011.0.0-M4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-193%20Off-by-one%20Error&color=brighgreen)
### Description
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh
- https://github.com/seal-community/patches