<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ARCGIS SERVER embedded APACHE TOMCAT Server - Critical Remote Code Execution Vulnerability in ArcGIS Enterprise Questions</title>
    <link>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1575700#M41399</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have ARCGIS Server 11.3 deployed in Production environment and recently the Cybersecurity Department flagged a vulnerability presence.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Vulnerability&lt;/STRONG&gt; Details -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2024-56337&lt;/STRONG&gt;: &lt;STRONG&gt;Apache Tomcat Patches Critical Remote Code Execution Vulnerability&lt;/STRONG&gt; (Update Apache Tomcat )-&amp;nbsp;The vulnerability stems from an incomplete mitigation of previous vulnerability (CVE-2024-50379). The flaw is exploitable on case-insensitive file systems where Tomcat’s default servlet has write functionality enabled. By manipulating specific paths, attackers can bypass security measures and upload malicious JSP files, leading to remote code execution. Exploitation of this vulnerability enables attackers to execute arbitrary code on the affected server, potentially granting them complete control over the system.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Installed&lt;/STRONG&gt; &lt;STRONG&gt;Version&lt;/STRONG&gt; -&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Apache Tomcat -&amp;nbsp;9.0.84.0 (ArcGIS 11.3) (Affected Version).&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Product Affected Versions&amp;nbsp;&lt;BR /&gt;Apache Tomcat&lt;BR /&gt;11.0.0-M1 to 11.0.1&lt;BR /&gt;10.1.0-M1 to 10.1.33&lt;BR /&gt;9.0.0.M1 to 9.0.97&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Fixed Tomcat Versions -&lt;BR /&gt;11.0.2 or later&lt;BR /&gt;10.1.34 or later&lt;BR /&gt;9.0.98 or later&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Similar Post (&lt;/STRONG&gt;but without any solution)&lt;STRONG&gt; -&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://community.esri.com/t5/arcgis-enterprise-questions/does-apache-tomcat-come-embedded-with-arcgis/td-p/1078440/page/2" target="_blank" rel="noopener"&gt;https://community.esri.com/t5/arcgis-enterprise-questions/does-apache-tomcat-come-embedded-with-arcgis/td-p/1078440/page/2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;We planned to fix this but came to understand from the above Post that even if try upgrading the Production Environment to ArcGIS Enterprise 11.4 the Apache Tomcat Version Embedded comes with vulnerable version -&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;Apache Tomcat -9.0.93.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This issue of Apache Tomcat needs a Patch from ESRI for the&amp;nbsp; ArcGIS Enterprise 11.3 and 11.4 versions as well.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 15 Jan 2025 04:23:18 GMT</pubDate>
    <dc:creator>vipulsoni</dc:creator>
    <dc:date>2025-01-15T04:23:18Z</dc:date>
    <item>
      <title>ARCGIS SERVER embedded APACHE TOMCAT Server - Critical Remote Code Execution Vulnerability</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1575700#M41399</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have ARCGIS Server 11.3 deployed in Production environment and recently the Cybersecurity Department flagged a vulnerability presence.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Vulnerability&lt;/STRONG&gt; Details -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2024-56337&lt;/STRONG&gt;: &lt;STRONG&gt;Apache Tomcat Patches Critical Remote Code Execution Vulnerability&lt;/STRONG&gt; (Update Apache Tomcat )-&amp;nbsp;The vulnerability stems from an incomplete mitigation of previous vulnerability (CVE-2024-50379). The flaw is exploitable on case-insensitive file systems where Tomcat’s default servlet has write functionality enabled. By manipulating specific paths, attackers can bypass security measures and upload malicious JSP files, leading to remote code execution. Exploitation of this vulnerability enables attackers to execute arbitrary code on the affected server, potentially granting them complete control over the system.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Installed&lt;/STRONG&gt; &lt;STRONG&gt;Version&lt;/STRONG&gt; -&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Apache Tomcat -&amp;nbsp;9.0.84.0 (ArcGIS 11.3) (Affected Version).&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Product Affected Versions&amp;nbsp;&lt;BR /&gt;Apache Tomcat&lt;BR /&gt;11.0.0-M1 to 11.0.1&lt;BR /&gt;10.1.0-M1 to 10.1.33&lt;BR /&gt;9.0.0.M1 to 9.0.97&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Fixed Tomcat Versions -&lt;BR /&gt;11.0.2 or later&lt;BR /&gt;10.1.34 or later&lt;BR /&gt;9.0.98 or later&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Similar Post (&lt;/STRONG&gt;but without any solution)&lt;STRONG&gt; -&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://community.esri.com/t5/arcgis-enterprise-questions/does-apache-tomcat-come-embedded-with-arcgis/td-p/1078440/page/2" target="_blank" rel="noopener"&gt;https://community.esri.com/t5/arcgis-enterprise-questions/does-apache-tomcat-come-embedded-with-arcgis/td-p/1078440/page/2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;We planned to fix this but came to understand from the above Post that even if try upgrading the Production Environment to ArcGIS Enterprise 11.4 the Apache Tomcat Version Embedded comes with vulnerable version -&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;Apache Tomcat -9.0.93.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This issue of Apache Tomcat needs a Patch from ESRI for the&amp;nbsp; ArcGIS Enterprise 11.3 and 11.4 versions as well.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 04:23:18 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1575700#M41399</guid>
      <dc:creator>vipulsoni</dc:creator>
      <dc:date>2025-01-15T04:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: ARCGIS SERVER embedded APACHE TOMCAT Server - Critical Remote Code Execution Vulnerability</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1575708#M41403</link>
      <description>&lt;P&gt;I believe this post will address your concerns.&amp;nbsp;&lt;A href="https://community.esri.com/t5/arcgis-enterprise-questions/apache-tomcat-vulnerability-cve-2024-50379/m-p/1574838/highlight/true#M41383" target="_blank"&gt;https://community.esri.com/t5/arcgis-enterprise-questions/apache-tomcat-vulnerability-cve-2024-50379/m-p/1574838/highlight/true#M41383&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The very last comment references the CVE you are concerned about (although you'll need to read the entire thread for the full explanation).&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 04:44:02 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1575708#M41403</guid>
      <dc:creator>RyanUthoff</dc:creator>
      <dc:date>2025-01-15T04:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: ARCGIS SERVER embedded APACHE TOMCAT Server - Critical Remote Code Execution Vulnerability</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1575975#M41421</link>
      <description>&lt;P&gt;Where would one go on a computer (server) with ArcGIS Server installed to find out the version of&amp;nbsp;&lt;SPAN&gt;Apache Tomcat?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can this be found in Control Panel as I do not see mention of Apache Tomcat software there?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 20:56:46 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1575975#M41421</guid>
      <dc:creator>MikeVolz</dc:creator>
      <dc:date>2025-01-15T20:56:46Z</dc:date>
    </item>
    <item>
      <title>Re: ARCGIS SERVER embedded APACHE TOMCAT Server - Critical Remote Code Execution Vulnerability</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1575984#M41422</link>
      <description>&lt;P&gt;It is in the link in the original post:&amp;nbsp;&lt;A href="https://community.esri.com/t5/arcgis-enterprise-questions/does-apache-tomcat-come-embedded-with-arcgis/m-p/1557532/highlight/true#M40954" target="_blank"&gt;https://community.esri.com/t5/arcgis-enterprise-questions/does-apache-tomcat-come-embedded-with-arcgis/m-p/1557532/highlight/true#M40954&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 21:12:53 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1575984#M41422</guid>
      <dc:creator>George_Thompson</dc:creator>
      <dc:date>2025-01-15T21:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: ARCGIS SERVER embedded APACHE TOMCAT Server - Critical Remote Code Execution Vulnerability</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1575989#M41423</link>
      <description>&lt;P&gt;George:&lt;/P&gt;&lt;P&gt;The original post in this thread says:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Product Affected Versions&amp;nbsp;&lt;BR /&gt;Apache Tomcat&lt;BR /&gt;11.0.0-M1 to 11.0.1&lt;BR /&gt;10.1.0-M1 to 10.1.33&lt;BR /&gt;9.0.0.M1 to 9.0.97&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I ran version.bat on my server and it returned 9.0.84.0 which appears to be within the affected range.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;As such how does one get an upgraded Apache Tomcat version?&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 21:22:04 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1575989#M41423</guid>
      <dc:creator>MikeVolz</dc:creator>
      <dc:date>2025-01-15T21:22:04Z</dc:date>
    </item>
    <item>
      <title>Re: ARCGIS SERVER embedded APACHE TOMCAT Server - Critical Remote Code Execution Vulnerability</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1576304#M41424</link>
      <description>&lt;P&gt;Tomcat can be separately downloaded from APACHE and can be updated in the ArcGIS Server installation directory, but this is not at all recommended from ESRI. it might lead system instability issues.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.esri.com/t5/arcgis-enterprise-questions/apache-tomcat-vulnerability-cve-2024-50379/m-p/1570749/highlight/true#M41280" target="_blank"&gt;https://community.esri.com/t5/arcgis-enterprise-questions/apache-tomcat-vulnerability-cve-2024-50379/m-p/1570749/highlight/true#M41280&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 08:36:37 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1576304#M41424</guid>
      <dc:creator>vipulsoni</dc:creator>
      <dc:date>2025-01-16T08:36:37Z</dc:date>
    </item>
    <item>
      <title>Re: ARCGIS SERVER embedded APACHE TOMCAT Server - Critical Remote Code Execution Vulnerability</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1576344#M41426</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.esri.com/t5/user/viewprofilepage/user-id/2853"&gt;@vipulsoni&lt;/a&gt;&amp;nbsp;said, this is not a supported / recommended path. Please see the comment from&amp;nbsp;&lt;a href="https://community.esri.com/t5/user/viewprofilepage/user-id/2892"&gt;@RandallWilliams&lt;/a&gt;&amp;nbsp;here:&amp;nbsp;&lt;A href="https://community.esri.com/t5/arcgis-enterprise-questions/apache-tomcat-vulnerability-cve-2024-50379/m-p/1573139/highlight/true#M41337" target="_blank"&gt;https://community.esri.com/t5/arcgis-enterprise-questions/apache-tomcat-vulnerability-cve-2024-50379/m-p/1573139/highlight/true#M41337&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I would highly recommend you go over to the&amp;nbsp;&lt;A href="https://trust.arcgis.com/en/" target="_blank"&gt;https://trust.arcgis.com/en/&lt;/A&gt;&amp;nbsp;site and look at the documentation there related to this CVE.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 13:00:45 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1576344#M41426</guid>
      <dc:creator>George_Thompson</dc:creator>
      <dc:date>2025-01-16T13:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: ARCGIS SERVER embedded APACHE TOMCAT Server - Critical Remote Code Execution Vulnerability</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1610106#M42120</link>
      <description>&lt;P&gt;Don't do this. You will break ArcGIS Enterprise and make it LESS secure, not MORE secure. An in place upgrade of the embedded Tomcat is NOT the solution and is completely unsupported.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Apr 2025 17:45:13 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/arcgis-server-embedded-apache-tomcat-server/m-p/1610106#M42120</guid>
      <dc:creator>RandallWilliams</dc:creator>
      <dc:date>2025-04-29T17:45:13Z</dc:date>
    </item>
  </channel>
</rss>

