Skip to content
logo logoSelf Service
Sign In Sign Up
  • Home
  • Knowledgebase
Back

Apache Tomcat Incomplete Cleanup Vulnerability

Updated 08/20/2024 02:26:07 PM by hvuser
  • PDF
  • Print
  • Share
    • Facebook
  • Copy To Clipboard
  • Collapse All Expand All

Content

Priority: ● High

Status: In Progress - Undergoing Analysis

 

First Published: 4 December, 2023

Advisory Version: 1.0

References:  CVE-2023-42794

Summary

A security vulnerability recently discovered in Apache Tomcat v9.0.70 through v9.0.80, and v8.5.85 through v8.5.93, could allow a denial of service on Windows-based systems. Specifically, this vulnerability allows a temporary uploaded file to persist after web application's failure to close the write stream, potentially leading to a disk full condition.  

Affected Products

Vulnerable Products

If any products or solutions are found to be impacted, they will be indicated in this section, in subsequent updates to this advisory, along with information regarding fixed release versions (if such information is available at the time.)
 

Products Confirmed Not Vulnerable

Product Notes / Fixed Release Version
Software Products
Ops Center Analyzer
- Detail View Server
- Probe Server
Tomcat service is not used
Hitachi Configuration Manager (HCM)
 
Doesn't contain affected component
Hitachi Automation Director (HAD) Doesn't contain affected component
Hitachi Infrastructure Analytics Advisor (HIAA) Doesn't contain affected component

 

Recommended Actions

Please continue to check this Security Advisory, as new information will be added to it as it becomes available.

 

If any of the information presented above remains unclear, please contact the Hitachi Vantara Global Support Center, or your Vantara-authorized service and support provider.

The information contained herein is for informational purposes only. It is not intended as a guaranty or warranty about Hitachi Vantara’s products, including any guaranty or warranty that any product cannot be exploited by third parties. All product warranties and obligations to a customer must be specified in a mutually acceptable and executed contract between the parties.

Keywords: https://knowledge.hitachivantara.com/Security/Apache_Tomcat_Incomplete_Cleanup_Vulnerability

Related Solutions

  • Hitachi Vantara Security Advisories - Index Page
  • OpenSSH Versions Prior to 9.3p2 are Susceptible to a Vulnerability Which When Successfully Exploited Could Lead to Disclosure of Sensitive Information, Addition or Modification of Data, or Denial of Service (DoS)
  • Hitachi Content Platform Anywhere (HCP-AW) 4.4.5 and Later Allows Information Disclosure
  • "Spring4Shell" - RCE Vulnerabilities in Spring Framework and Spring Cloud Function
  • Curl and Libcurl Vulnerabilities
Solution ID
241403060182351
Last Modified Date
08/20/2024 02:26:07 PM
Attributes
Page Privacy and Permission Assignment
  • Page Privacy: Private
  • Page Level Permissions: Anonymous; Employee; Service Partner; Customer; IT; eServices
  • Article: cve
  • Pagetype: knowledgearticle
Taxonomy
  • Security Advisories > Advisories
Collections
  • Guest (Public)

Solution to Copy:

Copy to Clipboard

Failed to download PDF file.

Problem creating pdf file for the solution: 241403060182351
Close

Acknowledged.

Thank you for acknowledging that you have read and understood this solution.

Failure.

Unable to acknowlege. An error occurred.
Knowledge
  • Knowledgebase
Helpful Links
  • Community
  • Product Documentation
Upland RightAnswers | Self Service - 2024R2
© Sun Sep 07 21:00:08 EDT 2025 Upland Software, Inc. All Rights Reserved