View all vulnerabilities

CVE-2024-50379

Apache Tomcat Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability

Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
9.8
Score Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Versions
org.apache.tomcat:tomcat-catalina >= 11.0.0-M1 < 11.0.2; org.apache.tomcat:tomcat-catalina >= 10.1.0-M1 < 10.1.34; org.apache.tomcat:tomcat-catalina >= 9.0.0.M1 < 9.0.98; org.apache.tomcat.embed:tomcat-embed-core >= 11.0.0-M1 < 11.0.2; org.apache.tomcat.embed:tomcat-embed-core >= 10.1.0-M1 < 10.1.34; org.apache.tomcat.embed:tomcat-embed-core >= 9.0.0.M1 < 9.0.98; org.apache.tomcat:tomcat-catalina >= 8.5.0; org.apache.tomcat.embed:tomcat-embed-core >= 8.5.0
Severity
Ecosystem
Publish Date
December 17, 2024
Modified Date
August 8, 2025