Patch
CVE-2024-56337
with vRx
📜This script mitigates a known vulnerability in specific versions of Apache Tomcat, where improper handling of the sun.io.useCanonCaches property could lead to security risks. By setting this property explicitly in the setenv.sh configuration file, the script ensures the system is no longer vulnerable without requiring a software update.
🚀The vulnerability affects Apache Tomcat versions 9.0.98 and below, 10.1.0 to 10.1.34, and 11.0.0 to 11.0.2 when paired with Java versions 1.8, 11, or 17. Systems with these configurations could be at risk if the sun.io.useCanonCaches property is not set to false for Java versions 1.8 or 11, or remains true for Java version 17.
This script:
Locates the catalina.sh script to identify the Tomcat installation directory.
Creates or modifies the setenv.sh file in the bin directory of the Tomcat installation.
Adds the required JAVA_OPTS configuration to mitigate the vulnerability.
Notifies the user to restart Tomcat for the changes to take effect.
🛠️Leaving this vulnerability unaddressed could expose your systems to potential security breaches, allowing attackers to exploit improperly handled file system canonicalization. By applying this mitigation, you ensure the security and integrity of your Apache Tomcat setup without needing to perform disruptive updates.
Read more
Read less
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trusted by 600+ customers:




Solution
Remediate faster with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.