mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
3.9 KiB
3.9 KiB
CVE-2024-50379
Description
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.
POC
Reference
No PoCs from references.
Github
- https://github.com/12442RF/POC
- https://github.com/20142995/nuclei-templates
- https://github.com/ARESHAmohanad/THM
- https://github.com/ARESHAmohanad/tryhackme
- https://github.com/Alchemist3dot14/CVE-2024-50379
- https://github.com/DMW11525708/wiki
- https://github.com/Erosion2020/JavaSec
- https://github.com/JFOZ1010/Nuclei-Template-CVE-2024-50379
- https://github.com/LeonardoE95/yt-en
- https://github.com/Lern0n/Lernon-POC
- https://github.com/Ostorlab/KEV
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/Shinbatsu/awesome-tryhackme
- https://github.com/Shinbatsu/tryhackme-awesome
- https://github.com/SleepingBag945/CVE-2024-50379
- https://github.com/Threekiii/CVE
- https://github.com/YuoLuo/tomcat_cve_2024_50379_exploit
- https://github.com/Yuri08loveElaina/CVE-2024-50379
- https://github.com/Yuri08loveElaina/CVE-2024-50379-POC
- https://github.com/ZapcoMan/TomcatVulnToolkit
- https://github.com/adnan-kutay-yuksel/tryhackme-all-rooms-database
- https://github.com/adysec/POC
- https://github.com/bigb0x/CVE-2024-50379
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/damarant/CTF
- https://github.com/dear-cell/CVE-2024-50379
- https://github.com/diegopacheco/Smith
- https://github.com/dkstar11q/CVE-2024-50379-nuclei
- https://github.com/dragonked2/CVE-2024-50379-POC
- https://github.com/eeeeeeeeee-code/POC
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/gabrielvieira1/vollmed-java
- https://github.com/gomtaengi/CVE-2024-50379-exp
- https://github.com/greenberglinken/2023hvv_1
- https://github.com/iSee857/CVE-2024-50379-PoC
- https://github.com/iemotion/POC
- https://github.com/laoa1573/wy876
- https://github.com/lizhianyuguangming/CVE-2024-50379-exp
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oLy0/Vulnerability
- https://github.com/ph0ebus/Tomcat-CVE-2024-50379-Poc
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/pwnosec/CVE-2024-50379
- https://github.com/rix4uni/medium-writeups
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/tanjiti/sec_profile
- https://github.com/thmrevenant/tryhackme
- https://github.com/thunww/CVE-2024-50379
- https://github.com/tobiasGuta/custom-poc
- https://github.com/v3153/CVE-2024-50379-POC
- https://github.com/vitalii-moholivskyi/selected-cve-dataset-2024
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
- https://github.com/yiliufeng168/CVE-2024-50379-POC
- https://github.com/zhanpengliu-tencent/medium-cve
- https://github.com/zulloper/cve-poc