CVE-2024-22029

7.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Tomcat packaging where insecure file permissions during installation allow local users to win a race condition and gain root privileges. It affects systems where Tomcat is installed via vulnerable packaging methods, primarily impacting Linux distributions with specific package management implementations.

💻 Affected Systems

Products:
  • Apache Tomcat
Versions: Specific versions depend on packaging; check vendor advisories for affected distributions
Operating Systems: Linux distributions with vulnerable Tomcat packaging (SUSE mentioned in reference)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the packaging/installation process, not in Tomcat itself. Only affects systems during package installation or upgrade.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full root privileges on the system, enabling complete system compromise, data theft, persistence establishment, and lateral movement.

🟠

Likely Case

Local user with standard privileges escalates to root, gaining administrative control over the Tomcat server and underlying system.

🟢

If Mitigated

Attack fails due to proper file permission controls, SELinux/AppArmor restrictions, or lack of local user access.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring existing local access to the system.
🏢 Internal Only: MEDIUM - Internal users with local shell access could exploit this to gain root privileges on affected Tomcat servers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and winning a race condition during package installation/upgrade. Timing window is limited to installation process.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check distribution-specific updates (e.g., SUSE security updates)

Vendor Advisory: https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22029

Restart Required: No

Instructions:

1. Check your distribution's security advisories. 2. Update Tomcat package using your package manager (e.g., 'zypper update tomcat' for SUSE). 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Manual installation verification

linux

Manually verify file permissions after Tomcat installation to ensure no insecure permissions exist

find /usr/share/tomcat -type f -perm /o+w
find /etc/tomcat -type f -perm /o+w

Restrict local user access

all

Limit local shell access to Tomcat servers to trusted administrators only

🧯 If You Can't Patch

  • Monitor for unauthorized local user activity and file permission changes
  • Implement strict access controls to prevent untrusted local users from accessing Tomcat servers

🔍 How to Verify

Check if Vulnerable:

Check if Tomcat was installed/updated during a period when vulnerable packaging was used. Review package version and installation logs.

Check Version:

rpm -q tomcat (RPM-based) or dpkg -l tomcat (Debian-based) or check your distribution's package manager

Verify Fix Applied:

Verify Tomcat package version matches patched version from vendor advisory and check file permissions are secure.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected package installation/upgrade events
  • File permission changes in Tomcat directories
  • Unusual local user activity during maintenance windows

Network Indicators:

  • None - this is a local attack

SIEM Query:

source="package_manager" AND (event="install" OR event="upgrade") AND package="tomcat*"

🔗 References

📤 Share & Export