Document toolboxDocument toolbox

Critical Tomcat vulnerability (CVE-2024-56337, CVE-2024-50379)

Latest update date of this article:
2025-01-08

General information

A new critical security vulnerability for Tomcat application servers was reported on 2024-12-20. The vulnerability opens a remote code execution (RCE) flaw, which can only be abused on operating systems with non-case-sensitive file systems. This practically affects all Tomcat servers running on Windows Server. We recommend all customers running Tomcat-based Nexus components to update their systems as described below.

Linux-based or Docker-based installations are not affected.

Official sites for the CVEs

https://nvd.nist.gov/vuln/detail/CVE-2024-56337

https://nvd.nist.gov/vuln/detail/CVE-2024-50379

Affected components

Only Tomcat installations on non-case insensitive file systems (for example Windows Server) are affected.

If you have one of the following Nexus server components hosted on Windows, please update your Tomcat installation(s):

  • Identity Manager

  • Hermod

Update Tomcat version

Users are recommended to upgrade to Tomcat version 9.0.98,10.1.34 or 11.0.2, which fixes the issue.

Tomcat version 9.0.x:

  • Update to 9.0.98 or higher

Tomcat startup configuration

Ensure that the Java system property sun.io.useCanonCache is set for Tomcat as described below:

Copyright 2024 Technology Nexus Secured Business Solutions AB. All rights reserved.
Contact Nexus | https://www.nexusgroup.com | Disclaimer | Terms & Conditions