{"vulnerability": "CVE-2024-23672", "sightings": [{"uuid": "d32cf865-1ae3-444c-80e1-75092ded97bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23672", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4307", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23672\n\ud83d\udd25 CVSS Score: 6.2 (CVSS_V3)\n\ud83d\udd39 Description: Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.\n\nUsers are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.\n\ud83d\udccf Published: 2024-03-13T18:31:34Z\n\ud83d\udccf Modified: 2025-02-13T19:07:50Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-23672\n2. https://github.com/apache/tomcat/commit/0052b374684b613b0c849899b325ebe334ac6501\n3. https://github.com/apache/tomcat/commit/3631adb1342d8bbd8598802a12b63ad02c37d591\n4. https://github.com/apache/tomcat/commit/52d6650e062d880704898d7d8c1b2b7a3efe8068\n5. https://github.com/apache/tomcat/commit/b0e3b1bd78de270d53e319d7cb79eb282aa53cb9\n6. https://github.com/apache/tomcat\n7. https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f\n8. https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html\n9. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B\n10. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/736G4GPZWS2DSQO5WKXO3G6OMZKFEK55\n11. https://security.netapp.com/advisory/ntap-20240402-0002\n12. http://www.openwall.com/lists/oss-security/2024/03/13/4", "creation_timestamp": "2025-02-13T19:12:53.000000Z"}, {"uuid": "4348444c-1fd6-4f89-876e-de6e4a1c5a4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-23672", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "62b0de80-8fcd-4607-90a7-f51b865e88e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23672", "type": "seen", "source": "https://t.me/ctinow/206947", "content": "https://ift.tt/RSk2rKT\nCVE-2024-23672", "creation_timestamp": "2024-03-13T17:37:16.000000Z"}, {"uuid": "f757902d-ed3a-43a7-a848-4dad584a157c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23672", "type": "seen", "source": "https://t.me/ctinow/208255", "content": "https://ift.tt/D2JuPv5\nCVE-2024-23672", "creation_timestamp": "2024-03-14T22:56:58.000000Z"}]}