CVE-2025-24813

Public on 2025-03-10
Modified on 2025-04-11
Description
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.

If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT

If all of the following were true, a malicious user was able to perform remote code execution:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- application was using Tomcat's file based session persistence with the default storage location
- application included a library that may be leveraged in a deserialization attack

Users are recommended to upgrade to version 11.0.3, 10.1.35, 9.0.99 or later, which fixes the issue.

More justification and the patch links are available for all versions here:
[1] http://tomcat.apache.org/security-11.html
[2] http://tomcat.apache.org/security-10.html
[3] http://tomcat.apache.org/security-9.html
Severity
Important severity
Important
CVSS v3 Base Score
8.1
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
HAQM Linux 2 - Core tomcat 2025-03-26 ALAS2-2025-2812 Fixed
HAQM Linux 2 - Tomcat9 Extra tomcat 2025-03-26 ALAS2TOMCAT9-2025-016 Fixed
HAQM Linux 2023 tomcat10 2025-03-26 ALAS2023-2025-910 Fixed
HAQM Linux 1 tomcat8 2025-04-09 ALAS-2025-1969 Fixed
HAQM Linux 1 tomcat80 No Fix Planned
HAQM Linux 2023 tomcat9 2025-03-26 ALAS2023-2025-911 Fixed

CVSS Scores

Score Type Score Vector
HAQM Linux CVSSv3 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
NVD CVSSv3 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H