Cyber Posture

CVE-2025-24813

CriticalCISA KEVActive ExploitationPublic PoC

Published: 10 March 2025

Published
10 March 2025
Modified
23 October 2025
KEV Added
01 April 2025
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.9414 99.9th percentile
Risk Priority 96 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may transfer tools or other files from an external system into a compromised environment.

Security Summary

CVE-2025-24813 is a path equivalence vulnerability in the Default Servlet of Apache Tomcat, stemming from improper handling of 'file.Name' with internal dots. This flaw enables remote code execution, information disclosure, or injection of malicious content into uploaded files when writes are enabled on the servlet. It affects Apache Tomcat versions 11.0.0-M1 through 11.0.2, 10.1.0-M1 through 10.1.34, and 9.0.0.M1 through 9.0.98; end-of-life versions 8.5.0 through 8.5.100 are also vulnerable, as may be older EOL releases.

Unauthenticated remote attackers can exploit this if the default servlet has writes enabled (disabled by default), partial PUT support is enabled (default), and specific application configurations align. For information disclosure or content injection, attackers need a security-sensitive upload URL as a subdirectory of a public upload URL, knowledge of sensitive file names, and those files uploaded via partial PUT, allowing viewing or modification of sensitive files. Remote code execution requires the above plus file-based session persistence at the default location and an application library vulnerable to deserialization attacks. The CVSS v3.1 score is 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), linked to CWEs-44, -502, and -706.

Apache advisories recommend upgrading to Tomcat 11.0.3, 10.1.35, or 9.0.99, which address the issue. Supporting announcements from OSS-Security, Debian LTS, NetApp, and Vicarius detail detection and patching guidance.

Details

CWE(s)
CWE-44CWE-502CWE-706
KEV Date Added
01 April 2025

Affected Products

apache
tomcat
10.1.0, 11.0.0 · ≤ 9.0.99 · 10.1.1 — 10.1.35 · 11.0.1 — 11.0.3
debian
debian linux
11.0
netapp
bootstrap os
all versions

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
Why these techniques?

The path equivalence vulnerability in Apache Tomcat's public-facing Default Servlet directly enables exploitation of the application for initial access (T1190), facilitates information disclosure by allowing access to sensitive local files (T1005), and supports malicious file uploads/injections via partial PUT (T1105).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References