PT-2025-10603 · Apache +10 · Apache Tomcat +10
Sw0Rd1Ight
·
Published
2025-02-10
·
Updated
2025-07-17
·
CVE-2025-24813
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
Apache Tomcat versions 9.0.0.M1 through 9.0.98, 10.1.0-M1 through 10.1.34, and 11.0.0-M1 through 11.0.2.
Description:
The vulnerability in Apache Tomcat is caused by an error in handling uploaded session files and deserialization. Exploitation of the vulnerability allows an unauthenticated attacker to upload an arbitrary file to the server for subsequent execution. A public exploit is available for the vulnerability, and instances of exploitation have been recorded.
Recommendations:
To address the vulnerability, users are advised to upgrade to version 11.0.3, 10.1.35, or 9.0.99, which fixes the issue. Additionally, users can mitigate the problem by reverting to the default servlet configuration (readonly="true"), disabling partial PUT support, and avoiding the storage of confidential files in subdirectories of public upload paths.
Exploit
Fix
RCE
Deserialization of Untrusted Data
HTTP Request/Response Smuggling
Related Identifiers
Affected Products
References · 490
- 🔥 https://github.com/absholi7ly/POC-CVE-2025-24813⭐ 146 🔗 35 · Exploit
- 🔥 https://github.com/absholi7ly/POC-CVE-2025-24813/blob/main/README.md⭐ 143 🔗 35 · Exploit
- 🔥 https://github.com/SleepingBag945/CVE-2024-50379⭐ 84 🔗 17 · Exploit
- 🔥 https://github.com/ph0ebus/Tomcat-CVE-2024-50379-Poc⭐ 55 🔗 6 · Exploit
- 🔥 https://github.com/iSee857/CVE-2025-24813-PoC⭐ 18 🔗 11 · Exploit
- 🔥 https://github.com/iSee857/CVE-2024-50379-PoC⭐ 18 🔗 8 · Exploit
- 🔥 https://github.com/lizhianyuguangming/CVE-2024-50379-exp⭐ 13 🔗 2 · Exploit
- 🔥 https://github.com/v3153/CVE-2024-50379-POC⭐ 2 · Exploit
- 🔥 https://github.com/La3B0z/CVE-2025-24813-POC · Exploit
- 🔥 https://github.com/msadeghkarimi/CVE-2025-24813-Exploit · Exploit
- 🔥 https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813 · Exploit
- https://safe-surf.ru/specialists/bulletins-nkcki/719818 · Security Note
- https://osv.dev/vulnerability/USN-7525-1 · Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/718389 · Security Note
- https://errata.almalinux.org/10/ALSA-2025-7497.html · Vendor Advisory