CVE-2025-24813

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/03/2025
Last modified:
03/04/2025

Description

Path Equivalence: &amp;#39;file.Name&amp;#39; (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.<br /> <br /> If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:<br /> - writes enabled for the default servlet (disabled by default)<br /> - support for partial PUT (enabled by default)<br /> - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads<br /> - attacker knowledge of the names of security sensitive files being uploaded<br /> - the security sensitive files also being uploaded via partial PUT<br /> <br /> If all of the following were true, a malicious user was able to perform remote code execution:<br /> - writes enabled for the default servlet (disabled by default)<br /> - support for partial PUT (enabled by default)<br /> - application was using Tomcat&amp;#39;s file based session persistence with the default storage location<br /> - application included a library that may be leveraged in a deserialization attack<br /> <br /> Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* 9.0.1 (including) 9.0.99 (excluding)
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* 10.1.1 (including) 10.1.35 (excluding)
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* 11.0.1 (including) 11.0.3 (excluding)
cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*