VYPR
Moderate severityNVD Advisory· Published Oct 10, 2023· Updated Oct 29, 2025

Apache Tomcat: FileUpload: DoS due to accumulation of temporary files on Windows

CVE-2023-42794

Description

Incomplete Cleanup vulnerability in Apache Tomcat.

The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, in progress refactoring that exposed a potential denial of service on Windows if a web application opened a stream for an uploaded file but failed to close the stream. The file would never be deleted from disk creating the possibility of an eventual denial of service due to the disk being full.

Other, EOL versions may also be affected.

Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Tomcat on Windows fails to clean up temporary uploaded files if the stream is not closed, leading to disk full denial of service.

Vulnerability

Overview

CVE-2023-42794 is an incomplete cleanup vulnerability in Apache Tomcat's internal fork of Commons FileUpload, affecting versions 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 on Windows [1]. The flaw originates from an unreleased refactoring that introduced a failure to delete temporary files when a web application opens an uploaded file stream but does not close it [2].

Exploitation

Conditions

On Windows platforms, if a web application opens an InputStream for an uploaded file and fails to properly close it, the temporary file remains on disk indefinitely [2]. No special privileges or authentication is required beyond the ability to upload files through a vulnerable Tomcat-based application. The attack surface is limited to applications that rely on Tomcat's file upload handling and misuse the stream lifecycle.

Impact

An attacker can repeatedly exploit this memory leak by uploading files, causing temporary files to accumulate on disk over time [1]. Because the files are never deleted, this can lead to the filesystem becoming full, resulting in a denial of service (DoS) condition where the server can no longer operate normally [2]. The impact is cumulative and may take time to manifest, but it does not require high complexity or privileges.

Mitigation

Apache has addressed the issue in Tomcat 9.0.81 and 8.5.94 [1]. Users are strongly recommended to upgrade to these or later versions. As an interim workaround, applications should ensure that all input streams for uploaded files are properly closed in a finally block. End-of-life (EOL) Tomcat versions may also be vulnerable but will not receive patches [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.tomcat:tomcat-coyoteMaven
>= 9.0.70, < 9.0.819.0.81
org.apache.tomcat:tomcat-coyoteMaven
>= 8.5.85, < 8.5.948.5.94

Affected products

38

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.