QID 356454

Date Published: 2023-11-08

QID 356454: Amazon Linux Security Advisory for tomcat8 : ALAS-2023-1861

Apache commons fileupload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a dos with a malicious upload or series of uploads.
Note that, like all of the file upload limits, the new configuration option (fileuploadbase#setfilecountmax) is not enabled by default and must be explicitly configured. (
( CVE-2023-24998) url redirection to untrusted site ('open redirect') vulnerability in form authentication feature apache tomcat.
This issue affects apache tomcat: from 11.0.0-m1 through 11.0.0-m10, from 10.1.0-m1 through 10.0.12, from 9.0.0-m1 through 9.0.79 and from 8.5.0 through 8.5.92. the vulnerability is limited to the root (default) web application. (
( CVE-2023-41080)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2023-1861 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 356454

    Software Advisories
    Advisory ID Software Component Link
    ALAS-2023-1861 amazon linux URL Logo alas.aws.amazon.com/ALAS-2023-1861.html