Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 11, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 11, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 11, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 11, 2025

      I never thought I’d love a triangular PC gaming headset, but these RGB-lit wireless cans are pretty great

      May 11, 2025

      When is the best time to book your flight? Google just gave us the golden answer

      May 11, 2025

      Diablo 4 gives you the chance to win a Mother’s Day candle and express your love (or hatred) with “Mother’s Judgement”

      May 10, 2025

      Here’s how to speedrun the Call of Duty: Black Ops 6 and Warzone Blaze of Glory event as fast as possible

      May 10, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Build Digital Assets & Earn Through Referrals with Biela — A Genuine Opportunity for Entrepreneurs

      May 11, 2025
      Recent

      Build Digital Assets & Earn Through Referrals with Biela — A Genuine Opportunity for Entrepreneurs

      May 11, 2025

      Laravel Routing

      May 10, 2025

      Big Node, VS Code, and Mantine updates

      May 9, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      I never thought I’d love a triangular PC gaming headset, but these RGB-lit wireless cans are pretty great

      May 11, 2025
      Recent

      I never thought I’d love a triangular PC gaming headset, but these RGB-lit wireless cans are pretty great

      May 11, 2025

      Drakboot is a GRUB graphical configuration tool

      May 11, 2025

      Le notizie minori del mondo GNU/Linux e dintorni della settimana nr 19/2025

      May 11, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CERT NZ Warns of Critical Apache Tomcat Vulnerability (CVE-2025-24813) Under Active Exploitation

    CERT NZ Warns of Critical Apache Tomcat Vulnerability (CVE-2025-24813) Under Active Exploitation

    March 19, 2025

    Apache Tomcat vulnerability

    The New Zealand Computer Emergency Response Team (CERT NZ) has issued an urgent security advisory warning of a critical vulnerability, CVE-2025-24813, that affects several versions of Apache Tomcat. This Apache Tomcat vulnerability presents serious security risks, including remote code execution (RCE), information disclosure, and content corruption.  

    The vulnerability, CVE-2025-24813, is found in Apache Tomcat versions 9.x, 10.x, and 11.x, with certain configurations making systems particularly susceptible to attack. According to the advisory, this flaw could allow an unauthenticated attacker to upload a malicious serialized payload to a vulnerable server. If specific conditions are met, the attacker can exploit this flaw to execute arbitrary code on the server. 

    This Apache Tomcat vulnerability is linked to the default servlet of Apache Tomcat, which handles HTTP requests. A malicious attacker could exploit improper handling of file uploads by the default servlet to execute harmful code or gain access to sensitive information. The issue is particularly concerning as it could lead to remote code execution (RCE) or allow attackers to manipulate or corrupt sensitive data. 

    Affected Versions due to Apache Tomcat Vulnerability 

    The vulnerability affects the following versions of Apache Tomcat: 

    • Apache Tomcat 11.0.0-M1 to 11.0.2 
    • Apache Tomcat 10.1.0-M1 to 10.1.34 
    • Apache Tomcat 9.0.0.M1 to 9.0.98 

    These versions are vulnerable to CVE-2025-24813 if they meet additional conditions outlined in the vendor advisory. Applications running on these versions are at risk if they allow file uploads with partial PUT support enabled, especially if attackers can manipulate the file paths and exploit insecure configurations. 

    How Attackers Could Exploit CVE-2025-24813 

    Exploiting CVE-2025-24813 requires specific conditions. To view sensitive files or inject malicious content into these files, the following conditions must be met: 

    1. Writes enabled for the default servlet (disabled by default). 
    2. Partial PUT support enabled (enabled by default). 
    3. A target URL for sensitive uploads located within a sub-directory of public uploads. 
    4. Knowledge of the names of sensitive files being uploaded. 
    5. The vulnerable files also being uploaded via partial PUT. 

    For an attacker to gain remote code execution, additional conditions must be met: 

    1. The application is using Tomcat’s file-based session persistence with the default storage location. 
    2. The application includes a library that could be used in a deserialization attack. 

    The New Zealand CERT also noted that a proof-of-concept (PoC) and reports of active exploitation have already surfaced, making this flaw even more pressing for those using vulnerable versions.

    Why You Should Be Concerned 

    The severity of CVE-2025-24813 cannot be overstated. Given that it allows for remote code execution and information disclosure, organizations could face severe consequences, including the unauthorized execution of arbitrary code, exposure of sensitive data, or potential corruption of vital application files. 

    The flaw is particularly dangerous as it is relatively easy for attackers to exploit, especially when all the conditions for partial PUT support and other configurations are met. For organizations that rely on Apache Tomcat to serve Java applications, the risk of exposure is significant, and immediate action is required.

    How to Protect Your Systems 

    To mitigate the risks associated with CVE-2025-24813, Apache Tomcat users are advised to upgrade their installations to secure versions. The following versions have fixed the vulnerability: 

    • Apache Tomcat 11.0.3 or later 
    • Apache Tomcat 10.1.35 or later 
    • Apache Tomcat 9.0.99 or later 

    Upgrading to one of these versions will ensure that systems are no longer vulnerable to this flaw. Additionally, system administrators should follow best practices for securing their Tomcat configurations, including disabling unnecessary features and ensuring that file upload capabilities are appropriately configured. 

    Conclusion

    CVE-2025-24813 is actively being exploited, with a proof of concept confirmed by the NCSC. To mitigate risks, organizations should upgrade to Apache Tomcat versions 11.0.3, 10.1.35, or 9.0.99, disable unnecessary features, monitor for suspicious activity, and apply security patches promptly. As Apache Tomcat is widely used, keeping systems updated is crucial to avoid remote code execution, information disclosure, and content corruption. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleSingapore Inks Deal with Oracle for “Isolated” Cloud Computing and AI Services
    Next Article CISA Warns of Exploited GitHub Action CVE-2025-30066 – Users Urged to Patch

    Related Posts

    Development

    February 2025 Baseline monthly digest

    May 11, 2025
    Artificial Intelligence

    Markus Buehler receives 2025 Washington Award

    May 11, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Ruijie Networks’ Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks

    Development

    Enhancing Transformer Models with Filler Tokens: A Novel AI Approach to Boosting Computational Capabilities in Complex Problem Solving

    Development

    D-Rax: Enhancing Radiologic Precision through Expert-Integrated Vision-Language Models

    Development

    11 Best Free and Open Source Graphical Email Clients

    Linux
    GetResponse

    Highlights

    How an ‘internet of agents’ could help AIs connect and work together

    April 29, 2025

    AI agents are everywhere, but they don’t talk to each other. AGNTCY, an open-source collective,…

    AI can’t edit: Why ChatGPT failed hilariously at my simple image task

    July 1, 2024

    CVE-2025-46731 – Craft CMS SSTI Remote Code Execution Vulnerability

    May 5, 2025

    SyntaxError: invalid syntax // SyntaxError: unexpected EOF while parsing

    May 6, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.