Improper Input Validation in org.apache.tomcat.embed:tomcat-embed-core
CVE-2024-24549
- org.apache.tomcat.embed:tomcat-embed-core
- org.apache.tomcat.experimental:tomcat-embed-programmatic
- org.apache.tomcat:tomcat-coyote
Summary
According to the class of vulnerabilities "HTTP/2 CONTINUATION Flood," implementation of the HTTP/2 protocol without proper input validation or limits, leads to Denial of Service. This was found to affect Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed. This issue affects Apache Tomcat versions 8.5.0 through 8.5.98, 9.0.0-M1 through 9.0.85, 10.1.0-M1 through 10.1.18, and 11.0.0-M1 through 11.0.0-M16.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- NONE
- HIGH
CWE-20 - Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
References
Advisory Timeline
- Published