{"api_version":"1","generated_at":"2026-04-22T23:31:28+00:00","cve":"CVE-2023-42794","urls":{"html":"https://cve.report/CVE-2023-42794","api":"https://cve.report/api/cve/CVE-2023-42794.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-42794","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-42794"},"summary":{"title":"CVE-2023-42794","description":"Incomplete Cleanup vulnerability in Apache Tomcat.\n\nThe internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, \nin progress refactoring that exposed a potential denial of service on \nWindows if a web application opened a stream for an uploaded file but \nfailed to close the stream. The file would never be deleted from disk \ncreating the possibility of an eventual denial of service due to the \ndisk being full.\n\nUsers are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.","state":"PUBLIC","assigner":"security@apache.org","published_at":"2023-10-10 18:15:00","updated_at":"2023-10-16 14:00:00"},"problem_types":["CWE-459"],"metrics":[],"references":[{"url":"https://lists.apache.org/thread/vvbr2ms7lockj1hlhz5q3wmxb2mwcw82","name":"https://lists.apache.org/thread/vvbr2ms7lockj1hlhz5q3wmxb2mwcw82","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/10/10/8","name":"http://www.openwall.com/lists/oss-security/2023/10/10/8","refsource":"MISC","tags":[],"title":"oss-security - CVE-2023-42794: Apache Tomcat: FileUpload: DoS due to accumulation of\n temporary files on Windows","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-42794","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42794","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"42794","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"tomcat","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-42794","qid":"150729","title":"Apache Tomcat Denial of Service (DoS) Vulnerability (CVE-2023-42794)"},{"cve":"CVE-2023-42794","qid":"161276","title":"Oracle Enterprise Linux Security Update for tomcat (ELSA-2024-0125)"},{"cve":"CVE-2023-42794","qid":"161315","title":"Oracle Enterprise Linux Security Update for tomcat (ELSA-2024-0474)"},{"cve":"CVE-2023-42794","qid":"20399","title":"Oracle Database 19c Critical OJVM Patch Update - January 2024"},{"cve":"CVE-2023-42794","qid":"20400","title":"Oracle Database 19c Critical Patch Update - January 2024"},{"cve":"CVE-2023-42794","qid":"20401","title":"Oracle Database 21c Critical Patch Update - January 2024"},{"cve":"CVE-2023-42794","qid":"242835","title":"Red Hat Update for tomcat (RHSA-2024:0474)"},{"cve":"CVE-2023-42794","qid":"242881","title":"Red Hat Update for tomcat (RHSA-2024:0125)"},{"cve":"CVE-2023-42794","qid":"296106","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 64.157.2 Missing (CPUOCT2023)"},{"cve":"CVE-2023-42794","qid":"730934","title":"Apache Tomcat Denial of Service Vulnerability (CVE-2023-42794)"},{"cve":"CVE-2023-42794","qid":"730936","title":"Apache Tomcat Denial of Service Vulnerability (CVE-2023-42794)"},{"cve":"CVE-2023-42794","qid":"730978","title":"Atlassian Confluence Data Center and Server Denial of Service (DoS) Vulnerability (CONFSERVER-93164)"},{"cve":"CVE-2023-42794","qid":"755749","title":"SUSE Enterprise Linux Security Update for tomcat (SUSE-SU-2024:0472-1)"},{"cve":"CVE-2023-42794","qid":"941533","title":"AlmaLinux Security Update for tomcat (ALSA-2024:0125)"},{"cve":"CVE-2023-42794","qid":"941551","title":"AlmaLinux Security Update for tomcat (ALSA-2024:0474)"},{"cve":"CVE-2023-42794","qid":"995549","title":"Java (Maven) Security Update for org.apache.tomcat:tomcat (GHSA-jm7m-8jh6-29hp)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-42794","ASSIGNER":"security@apache.org","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Incomplete Cleanup vulnerability in Apache Tomcat.\n\nThe internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, \nin progress refactoring that exposed a potential denial of service on \nWindows if a web application opened a stream for an uploaded file but \nfailed to close the stream. The file would never be deleted from disk \ncreating the possibility of an eventual denial of service due to the \ndisk being full.\n\nUsers are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-459 Incomplete Cleanup","cweId":"CWE-459"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apache Software Foundation","product":{"product_data":[{"product_name":"Apache Tomcat","version":{"version_data":[{"version_affected":"<=","version_name":"9.0.70","version_value":"9.0.80"},{"version_affected":"<=","version_name":"8.5.85","version_value":"8.5.93"}]}}]}}]}},"references":{"reference_data":[{"url":"https://lists.apache.org/thread/vvbr2ms7lockj1hlhz5q3wmxb2mwcw82","refsource":"MISC","name":"https://lists.apache.org/thread/vvbr2ms7lockj1hlhz5q3wmxb2mwcw82"},{"url":"http://www.openwall.com/lists/oss-security/2023/10/10/8","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2023/10/10/8"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Mohammad Khedmatgozar (cellbox)"}]},"nvd":{"publishedDate":"2023-10-10 18:15:00","lastModifiedDate":"2023-10-16 14:00:00","problem_types":["CWE-459"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*","versionStartIncluding":"8.5.85","versionEndExcluding":"8.5.94","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.70","versionEndExcluding":"9.0.81","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}