CVE-2025-24813
March 10, 2025
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.
If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT
If all of the following were true, a malicious user was able to perform remote code execution:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- application was using Tomcat's file based session persistence with the default storage location
- application included a library that may be leveraged in a deserialization attack
Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
Affected Packages
https://github.com/apache/tomcat.git (GITHUB):
Affected version(s) Fix Suggestion:
Update to version 10.1.35https://github.com/apache/tomcat.git (GITHUB):
Affected version(s) Fix Suggestion:
Update to version 9.0.99https://github.com/apache/tomcat.git (GITHUB):
Affected version(s) Fix Suggestion:
Update to version 11.0.3org.apache.tomcat.embed:tomcat-embed-core (JAVA):
Affected version(s) Fix Suggestion:
Update to version 9.0.99org.apache.tomcat.embed:tomcat-embed-core (JAVA):
Affected version(s) >=10.1.0 <10.1.35Fix Suggestion:
Update to version 10.1.35org.apache.tomcat:tomcat-catalina (JAVA):
Affected version(s) >=11.0.0 <11.0.3Fix Suggestion:
Update to version 11.0.3org.apache.tomcat.embed:tomcat-embed-core (JAVA):
Affected version(s) Fix Suggestion:
Update to version 11.0.3org.apache.tomcat:tomcat-catalina (JAVA):
Affected version(s) Fix Suggestion:
Update to version 10.1.35org.apache.tomcat.embed:tomcat-embed-core (JAVA):
Affected version(s) Fix Suggestion:
Update to version 10.1.35org.apache.tomcat.embed:tomcat-embed-core (JAVA):
Affected version(s) >=11.0.0 <11.0.3Fix Suggestion:
Update to version 11.0.3org.apache.tomcat.embed:tomcat-embed-core (JAVA):
Affected version(s) >=9.0.1 <9.0.99Fix Suggestion:
Update to version 9.0.99org.apache.tomcat:tomcat-catalina (JAVA):
Affected version(s) >=9.0.1 <9.0.99Fix Suggestion:
Update to version 9.0.99org.apache.tomcat:tomcat-catalina (JAVA):
Affected version(s) Fix Suggestion:
Update to version 9.0.99org.apache.tomcat:tomcat-catalina (JAVA):
Affected version(s) Fix Suggestion:
Update to version 11.0.3org.apache.tomcat:tomcat-catalina (JAVA):
Affected version(s) >=10.1.0 <10.1.35Fix Suggestion:
Update to version 10.1.35Additional Notes
The description of this vulnerability differs from MITRE.
Related Resources (17)
Do you need more information?
Contact UsCVSS v4
Base Score:
9.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
Exploit Maturity
POC
CVSS v3
Base Score:
9.8
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Exploit Maturity
FUNCTIONAL
Weakness Type (CWE)
EPSS
Base Score:
10.0