
CVE-2024-56337 – Apache Tomcat: RCE due to TOCTOU issue in JSP compilation - CVE-2024-50379 mitigation was incomplete
https://notcve.org/view.php?id=CVE-2024-56337
20 Dec 2024 — Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. The mitigation for CVE-2024-50379 was incomplete. Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which... • https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2024-56128 – Apache Kafka: SCRAM authentication vulnerable to replay attacks when used without encryption
https://notcve.org/view.php?id=CVE-2024-56128
18 Dec 2024 — Incorrect Implementation of Authentication Algorithm in Apache Kafka's SCRAM implementation. Issue Summary: Apache Kafka's implementation of the Salted Challenge Response Authentication Mechanism (SCRAM) did not fully adhere to the requirements of RFC 5802 [1]. Specifically, as per RFC 5802, the server must verify that the nonce sent by the client in the second message matches the nonce sent by the server in its first message. However, Kafka's SCRAM implementation did not perform this validation. Impact: Th... • https://datatracker.ietf.org/doc/html/rfc5802 • CWE-303: Incorrect Implementation of Authentication Algorithm •

CVE-2024-54677 – Apache Tomcat: DoS in examples web application
https://notcve.org/view.php?id=CVE-2024-54677
17 Dec 2024 — Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue. A flaw was found in the "examples" web application of Apache Tomcat. Numerous examples within that application did not place limits on uploaded data. • https://lists.apache.org/thread/tdtbbxpg5trdwc2wnopcth9ccvdftq2n • CWE-400: Uncontrolled Resource Consumption •

CVE-2024-50379 – Apache Tomcat: RCE due to TOCTOU issue in JSP compilation
https://notcve.org/view.php?id=CVE-2024-50379
17 Dec 2024 — Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration). This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.08, which fixes the issue. Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability ... • https://github.com/yiliufeng168/CVE-2024-50379-POC • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2024-55633 – Apache Superset: SQLLab Improper readonly query validation allows unauthorized write access
https://notcve.org/view.php?id=CVE-2024-55633
12 Dec 2024 — Improper Authorization vulnerability in Apache Superset. On Postgres analytic databases an attacker with SQLLab access can craft a specially designed SQL DML statement that is Incorrectly identified as a read-only query, enabling its execution. Non postgres analytics database connections and postgres analytics database connections set with a readonly user (advised) are not vulnerable. This issue affects Apache Superset: before 4.1.0. Users are recommended to upgrade to version 4.1.0, which fixes the issue. • https://lists.apache.org/thread/bwmd17fcvljt9q4cgctp4v09zh3qs7fb • CWE-285: Improper Authorization CWE-863: Incorrect Authorization •

CVE-2024-53677 – Apache Struts: Mixing setters for uploaded files and normal fields can allow bypass file upload checks
https://notcve.org/view.php?id=CVE-2024-53677
11 Dec 2024 — File upload logic is flawed vulnerability in Apache Struts. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0, which fixes the issue. You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Exec... • https://packetstorm.news/files/id/183165 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2024-53949 – Apache Superset: Lower privilege users are able to create Role when FAB_ADD_SECURITY_API is enabled
https://notcve.org/view.php?id=CVE-2024-53949
09 Dec 2024 — Improper Authorization vulnerability in Apache Superset when FAB_ADD_SECURITY_API is enabled (disabled by default). Allows for lower privilege users to use this API. issue affects Apache Superset: from 2.0.0 before 4.1.0. Users are recommended to upgrade to version 4.1.0, which fixes the issue. Improper Authorization vulnerability in Apache Superset when FAB_ADD_SECURITY_API is enabled (disabled by default). Allows for lower privilege users to use this API. issue affects Apache Superset: from 2.0.0 before 4... • https://lists.apache.org/thread/d3scbwmfpzbpm6npnzdw5y4owtqqyq8d • CWE-285: Improper Authorization CWE-863: Incorrect Authorization •

CVE-2024-53948 – Apache Superset: Error verbosity exposes metadata in analytics databases
https://notcve.org/view.php?id=CVE-2024-53948
09 Dec 2024 — Generation of Error Message Containing analytics metadata Information in Apache Superset. This issue affects Apache Superset: before 4.1.0. Users are recommended to upgrade to version 4.1.0, which fixes the issue. • https://lists.apache.org/thread/8howpf3png0wrgpls46ggk441oczlfvf • CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2024-53947 – Apache Superset: Improper SQL authorisation, parse not checking for specific postgres functions
https://notcve.org/view.php?id=CVE-2024-53947
09 Dec 2024 — Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Superset. Specifically, certain engine-specific functions are not checked, which allows attackers to bypass Apache Superset's SQL authorization. This issue is a follow-up to CVE-2024-39887 with additional disallowed PostgreSQL functions now included: query_to_xml_and_xmlschema, table_to_xml, table_to_xml_and_xmlschema. This issue affects Apache Superset: <4.1.0. Users are recommended to upgrade to ve... • https://lists.apache.org/thread/hj3gfsjh67vqw12nlrshlsym4bkopjmn • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2024-46901 – Apache Subversion: mod_dav_svn denial-of-service via control characters in paths
https://notcve.org/view.php?id=CVE-2024-46901
09 Dec 2024 — Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository. All versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue. Repositories served via other access methods are not affected. • https://github.com/devhaozi/CVE-2024-46901 • CWE-20: Improper Input Validation CWE-116: Improper Encoding or Escaping of Output •