vulnerability
Oracle Linux: CVE-2025-24813: ELSA-2025-3645: tomcat security update (MODERATE) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:L/Au:N/C:C/I:P/A:P) | Mar 10, 2025 | Apr 9, 2025 | Apr 28, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:P/A:P)
Published
Mar 10, 2025
Added
Apr 9, 2025
Modified
Apr 28, 2025
Description
A flaw was found in Apache Tomcat. In certain conditions/configurations, this vulnerability allows a remote attacker to exploit a path equivalence flaw to view file system contents and/or add malicious content via a write-enabled Default Servlet in Apache Tomcat.
For the vulnerability to be exploited, the following conditions must be true: writes to the default servlet are enabled (disabled by default), sensitive file uploads are sub-directories of a target URL for public uploads, attackers know the names of the files, and those files are subject to partial PUT uploads (enabled by default). If an application uses file-based session persistence with default storage and includes exploitable libraries, remote code execution (RCE) is possible.
For the vulnerability to be exploited, the following conditions must be true: writes to the default servlet are enabled (disabled by default), sensitive file uploads are sub-directories of a target URL for public uploads, attackers know the names of the files, and those files are subject to partial PUT uploads (enabled by default). If an application uses file-based session persistence with default storage and includes exploitable libraries, remote code execution (RCE) is possible.
Solution(s)
oracle-linux-upgrade-tomcatoracle-linux-upgrade-tomcat-admin-webappsoracle-linux-upgrade-tomcat-docs-webapporacle-linux-upgrade-tomcat-el-3-0-apioracle-linux-upgrade-tomcat-jsp-2-3-apioracle-linux-upgrade-tomcat-liboracle-linux-upgrade-tomcat-servlet-4-0-apioracle-linux-upgrade-tomcat-webapps

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.