CVE-2024-34750

Apache Dos - template partially based on Vanilla tech-detect @ProjectDiscovery

id: CVE-2024-34750

info:
  name: CVE-2024-34750
  author: Redflare Cyber
  severity: high
  description: Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed.
  classification:
    cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
  metadata:
    max-request: 3
    vendor: apache
    product: tomcat
    shodan-query:
      - title:"Apache Tomcat"
      - http.title:"apache tomcat"
      - http.html:"apache tomcat"
      - cpe:"cpe:2.3:a:apache:tomcat"
    fofa-query:
      - body="apache tomcat"
      - title="apache tomcat"
    google-query: intitle:"apache tomcat"
  tags: tech,tomcat,apache,intrusive

http:
  - method: GET
    path:
      - "{{BaseURL}}"
      - "{{BaseURL}}/{{randstr}}"
      - "{{BaseURL}}/docs/introduction.html"

    stop-at-first-match: true

    extractors:
      - type: regex
        name: version
        group: 1
        regex:
          - '(?i)Apache Tomcat.*((11\.0\.0-M([1-9]|1[0-9]|20))|(10\.1\.0-M([1-9]|1[0-9]|2[0-4]))|(9\.0\.(0-M[1-9]|0-M1[0-9]|0-M20|[1-8][0-9]|9[0-8])))'

Last updated