Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 9, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 9, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 9, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 9, 2025

      Your password manager is under attack, and this new threat makes it worse: How to defend yourself

      May 9, 2025

      EcoFlow’s new backyard solar energy system starts at $599 – no installation crews or permits needed

      May 9, 2025

      Why Sonos’ cheapest smart speaker is one of my favorites – even a year after its release

      May 9, 2025

      7 productivity gadgets I can’t live without (and why they make such a big difference)

      May 9, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Tap into Your PHP Potential with Free Projects at PHPGurukul

      May 9, 2025
      Recent

      Tap into Your PHP Potential with Free Projects at PHPGurukul

      May 9, 2025

      Preparing for AI? Here’s How PIM Gets Your Data in Shape

      May 9, 2025

      A Closer Look at the AI Assistant of Oracle Analytics

      May 9, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      kew v3.2.0 improves internet radio support and more

      May 9, 2025
      Recent

      kew v3.2.0 improves internet radio support and more

      May 9, 2025

      GNOME Replace Totem Video Player with Showtime

      May 9, 2025

      Placemark is a web-based tool for geospatial data

      May 9, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CERT NZ Warns of Critical Apache Tomcat Vulnerability (CVE-2025-24813) Under Active Exploitation

    CERT NZ Warns of Critical Apache Tomcat Vulnerability (CVE-2025-24813) Under Active Exploitation

    March 19, 2025

    Apache Tomcat vulnerability

    The New Zealand Computer Emergency Response Team (CERT NZ) has issued an urgent security advisory warning of a critical vulnerability, CVE-2025-24813, that affects several versions of Apache Tomcat. This Apache Tomcat vulnerability presents serious security risks, including remote code execution (RCE), information disclosure, and content corruption.  

    The vulnerability, CVE-2025-24813, is found in Apache Tomcat versions 9.x, 10.x, and 11.x, with certain configurations making systems particularly susceptible to attack. According to the advisory, this flaw could allow an unauthenticated attacker to upload a malicious serialized payload to a vulnerable server. If specific conditions are met, the attacker can exploit this flaw to execute arbitrary code on the server. 

    This Apache Tomcat vulnerability is linked to the default servlet of Apache Tomcat, which handles HTTP requests. A malicious attacker could exploit improper handling of file uploads by the default servlet to execute harmful code or gain access to sensitive information. The issue is particularly concerning as it could lead to remote code execution (RCE) or allow attackers to manipulate or corrupt sensitive data. 

    Affected Versions due to Apache Tomcat Vulnerability 

    The vulnerability affects the following versions of Apache Tomcat: 

    • Apache Tomcat 11.0.0-M1 to 11.0.2 
    • Apache Tomcat 10.1.0-M1 to 10.1.34 
    • Apache Tomcat 9.0.0.M1 to 9.0.98 

    These versions are vulnerable to CVE-2025-24813 if they meet additional conditions outlined in the vendor advisory. Applications running on these versions are at risk if they allow file uploads with partial PUT support enabled, especially if attackers can manipulate the file paths and exploit insecure configurations. 

    How Attackers Could Exploit CVE-2025-24813 

    Exploiting CVE-2025-24813 requires specific conditions. To view sensitive files or inject malicious content into these files, the following conditions must be met: 

    1. Writes enabled for the default servlet (disabled by default). 
    2. Partial PUT support enabled (enabled by default). 
    3. A target URL for sensitive uploads located within a sub-directory of public uploads. 
    4. Knowledge of the names of sensitive files being uploaded. 
    5. The vulnerable files also being uploaded via partial PUT. 

    For an attacker to gain remote code execution, additional conditions must be met: 

    1. The application is using Tomcat’s file-based session persistence with the default storage location. 
    2. The application includes a library that could be used in a deserialization attack. 

    The New Zealand CERT also noted that a proof-of-concept (PoC) and reports of active exploitation have already surfaced, making this flaw even more pressing for those using vulnerable versions.

    Why You Should Be Concerned 

    The severity of CVE-2025-24813 cannot be overstated. Given that it allows for remote code execution and information disclosure, organizations could face severe consequences, including the unauthorized execution of arbitrary code, exposure of sensitive data, or potential corruption of vital application files. 

    The flaw is particularly dangerous as it is relatively easy for attackers to exploit, especially when all the conditions for partial PUT support and other configurations are met. For organizations that rely on Apache Tomcat to serve Java applications, the risk of exposure is significant, and immediate action is required.

    How to Protect Your Systems 

    To mitigate the risks associated with CVE-2025-24813, Apache Tomcat users are advised to upgrade their installations to secure versions. The following versions have fixed the vulnerability: 

    • Apache Tomcat 11.0.3 or later 
    • Apache Tomcat 10.1.35 or later 
    • Apache Tomcat 9.0.99 or later 

    Upgrading to one of these versions will ensure that systems are no longer vulnerable to this flaw. Additionally, system administrators should follow best practices for securing their Tomcat configurations, including disabling unnecessary features and ensuring that file upload capabilities are appropriately configured. 

    Conclusion

    CVE-2025-24813 is actively being exploited, with a proof of concept confirmed by the NCSC. To mitigate risks, organizations should upgrade to Apache Tomcat versions 11.0.3, 10.1.35, or 9.0.99, disable unnecessary features, monitor for suspicious activity, and apply security patches promptly. As Apache Tomcat is widely used, keeping systems updated is crucial to avoid remote code execution, information disclosure, and content corruption. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleSingapore Inks Deal with Oracle for “Isolated” Cloud Computing and AI Services
    Next Article CISA Warns of Exploited GitHub Action CVE-2025-30066 – Users Urged to Patch

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2024-13962 – Avast Cleanup Premium Link Following Local Privilege Escalation Vulnerability

    May 9, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2024-9524 – Avira Prime Link Following Local Privilege Escalation Vulnerability

    May 9, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Basset is an alternative way to load CSS & JS assets

    Development

    CVE-2025-45616 – Brcc Authentication Bypass Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Content-Adaptive Tokenizer (CAT): An Image Tokenizer that Adapts Token Count based on Image Complexity, Offering Flexible 8x, 16x, or 32x Compression

    Machine Learning

    I made an AirTag that lasts 10 years with this clever accesssory – here’s how

    News & Updates
    Hostinger

    Highlights

    You can now speak to Microsoft’s Copilot Voice in 40 languages, for free

    February 13, 2025

    The differences between ChatGPT’s Advanced Voice, Google’s Gemini Live, and Microsoft’s Copilot Voice are narrowing.…

    President Sally Kornbluth and OpenAI CEO Sam Altman discuss the future of AI

    May 6, 2024

    The best mini PCs of 2024: Expert recommended

    August 22, 2024

    BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

    March 29, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.