Vulnerability Details CVE-2023-28709
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 23.5%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2023-28709
-
cpe:2.3:a:apache:tomcat:10.1.5
-
cpe:2.3:a:apache:tomcat:10.1.6
-
cpe:2.3:a:apache:tomcat:10.1.7
-
cpe:2.3:a:apache:tomcat:11.0.0
-
cpe:2.3:a:apache:tomcat:8.5.85
-
cpe:2.3:a:apache:tomcat:8.5.86
-
cpe:2.3:a:apache:tomcat:8.5.87
-
cpe:2.3:a:apache:tomcat:9.0.71
-
cpe:2.3:a:apache:tomcat:9.0.72
-
cpe:2.3:a:apache:tomcat:9.0.73
-
cpe:2.3:a:netapp:7-mode_transition_tool:-
-
cpe:2.3:o:debian:debian_linux:12.0