mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
77 lines
3.9 KiB
Markdown
77 lines
3.9 KiB
Markdown
### [CVE-2024-50379](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50379)
|
|

|
|

|
|

|
|

|
|

|
|

|
|
%20Race%20Condition&color=brightgreen)
|
|
|
|
### Description
|
|
|
|
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/12442RF/POC
|
|
- https://github.com/20142995/nuclei-templates
|
|
- https://github.com/ARESHAmohanad/THM
|
|
- https://github.com/ARESHAmohanad/tryhackme
|
|
- https://github.com/Alchemist3dot14/CVE-2024-50379
|
|
- https://github.com/DMW11525708/wiki
|
|
- https://github.com/Erosion2020/JavaSec
|
|
- https://github.com/JFOZ1010/Nuclei-Template-CVE-2024-50379
|
|
- https://github.com/LeonardoE95/yt-en
|
|
- https://github.com/Lern0n/Lernon-POC
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/PuddinCat/GithubRepoSpider
|
|
- https://github.com/Shinbatsu/awesome-tryhackme
|
|
- https://github.com/Shinbatsu/tryhackme-awesome
|
|
- https://github.com/SleepingBag945/CVE-2024-50379
|
|
- https://github.com/Threekiii/CVE
|
|
- https://github.com/YuoLuo/tomcat_cve_2024_50379_exploit
|
|
- https://github.com/Yuri08loveElaina/CVE-2024-50379
|
|
- https://github.com/Yuri08loveElaina/CVE-2024-50379-POC
|
|
- https://github.com/ZapcoMan/TomcatVulnToolkit
|
|
- https://github.com/adnan-kutay-yuksel/tryhackme-all-rooms-database
|
|
- https://github.com/adysec/POC
|
|
- https://github.com/bigb0x/CVE-2024-50379
|
|
- https://github.com/cyb3r-w0lf/nuclei-template-collection
|
|
- https://github.com/damarant/CTF
|
|
- https://github.com/dear-cell/CVE-2024-50379
|
|
- https://github.com/diegopacheco/Smith
|
|
- https://github.com/dkstar11q/CVE-2024-50379-nuclei
|
|
- https://github.com/dragonked2/CVE-2024-50379-POC
|
|
- https://github.com/eeeeeeeeee-code/POC
|
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
|
- https://github.com/gabrielvieira1/vollmed-java
|
|
- https://github.com/gomtaengi/CVE-2024-50379-exp
|
|
- https://github.com/greenberglinken/2023hvv_1
|
|
- https://github.com/iSee857/CVE-2024-50379-PoC
|
|
- https://github.com/iemotion/POC
|
|
- https://github.com/laoa1573/wy876
|
|
- https://github.com/lizhianyuguangming/CVE-2024-50379-exp
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/oLy0/Vulnerability
|
|
- https://github.com/ph0ebus/Tomcat-CVE-2024-50379-Poc
|
|
- https://github.com/plzheheplztrying/cve_monitor
|
|
- https://github.com/pwnosec/CVE-2024-50379
|
|
- https://github.com/rix4uni/medium-writeups
|
|
- https://github.com/taielab/awesome-hacking-lists
|
|
- https://github.com/tanjiti/sec_profile
|
|
- https://github.com/thmrevenant/tryhackme
|
|
- https://github.com/thunww/CVE-2024-50379
|
|
- https://github.com/tobiasGuta/custom-poc
|
|
- https://github.com/v3153/CVE-2024-50379-POC
|
|
- https://github.com/vitalii-moholivskyi/selected-cve-dataset-2024
|
|
- https://github.com/wy876/POC
|
|
- https://github.com/wy876/wiki
|
|
- https://github.com/yiliufeng168/CVE-2024-50379-POC
|
|
- https://github.com/zhanpengliu-tencent/medium-cve
|
|
- https://github.com/zulloper/cve-poc
|
|
|