Skip to main content

Improper Input Validation in org.apache.tomcat.embed:tomcat-embed-core

CVE-2024-24549

  • org.apache.tomcat.embed:tomcat-embed-core
  • org.apache.tomcat.experimental:tomcat-embed-programmatic
  • org.apache.tomcat:tomcat-coyote
Severity High
Score 7.5/10

Summary

According to the class of vulnerabilities "HTTP/2 CONTINUATION Flood," implementation of the HTTP/2 protocol without proper input validation or limits, leads to Denial of Service. This was found to affect Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed. This issue affects Apache Tomcat versions 8.5.0 through 8.5.98, 9.0.0-M1 through 9.0.85, 10.1.0-M1 through 10.1.18, and 11.0.0-M1 through 11.0.0-M16.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • NONE
  • HIGH

CWE-20 - Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Advisory Timeline

  • Published