CVE-2023-28709
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/05/2023
Last modified:
13/02/2025
Description
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* | 8.5.85 (including) | 8.5.87 (including) |
| cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* | 9.0.71 (including) | 9.0.73 (including) |
| cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* | 10.1.5 (including) | 10.1.7 (including) |
| cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2023/05/22/1
- https://lists.apache.org/thread/7wvxonzwb7k9hx9jt3q33cmy7j97jo3j
- https://security.gentoo.org/glsa/202305-37
- https://security.netapp.com/advisory/ntap-20230616-0004/
- https://www.debian.org/security/2023/dsa-5521
- http://www.openwall.com/lists/oss-security/2023/05/22/1
- https://lists.apache.org/thread/7wvxonzwb7k9hx9jt3q33cmy7j97jo3j
- https://security.gentoo.org/glsa/202305-37
- https://security.netapp.com/advisory/ntap-20230616-0004/
- https://www.debian.org/security/2023/dsa-5521



