CVE-2024-52317

Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone23:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone24:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone25:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone26:*:*:*:*:*:*

History

15 May 2025, 17:51

Type Values Removed Values Added
First Time Apache
Apache tomcat
CPE cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone24:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone23:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone25:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone26:*:*:*:*:*:*
References () https://lists.apache.org/thread/ty376mrxy1mmxtw3ogo53nc9l3co3dfs - () https://lists.apache.org/thread/ty376mrxy1mmxtw3ogo53nc9l3co3dfs - Vendor Advisory, Mailing List
References () http://www.openwall.com/lists/oss-security/2024/11/18/3 - () http://www.openwall.com/lists/oss-security/2024/11/18/3 - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20250124-0004/ - () https://security.netapp.com/advisory/ntap-20250124-0004/ - Third Party Advisory

24 Jan 2025, 20:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250124-0004/ -

21 Nov 2024, 09:46

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/11/18/3 -

18 Nov 2024, 17:11

Type Values Removed Values Added
Summary
  • (es) Vulnerabilidad de reutilización y reciclaje incorrecto de objetos en Apache Tomcat. El reciclaje incorrecto de la solicitud y la respuesta utilizadas por las solicitudes HTTP/2 podría provocar una confusión de solicitudes y/o respuestas entre usuarios. Este problema afecta a Apache Tomcat: desde 11.0.0-M23 hasta 11.0.0-M26, desde 10.1.27 hasta 10.1.30, desde 9.0.92 hasta 9.0.95. Se recomienda a los usuarios que actualicen a la versión 11.0.0, 10.1.31 o 9.0.96, que soluciona el problema.

18 Nov 2024, 15:35

Type Values Removed Values Added
CWE CWE-326
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

18 Nov 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-18 12:15

Updated : 2025-05-15 17:51


NVD link : CVE-2024-52317

Mitre link : CVE-2024-52317

CVE.ORG link : CVE-2024-52317


JSON object : View

Products Affected

apache

  • tomcat
CWE
CWE-326

Inadequate Encryption Strength