CVE-2025-24813: CWE-44 Path Equivalence: 'file.name' (Internal Dot) in Apache Software Foundation Apache Tomcat
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
AI Analysis
Technical Summary
CVE-2025-24813 is a critical vulnerability in Apache Tomcat, a widely used open-source Java Servlet Container developed by the Apache Software Foundation. The vulnerability arises from a path equivalence issue involving internal dots in file names ('file.name'), classified under CWE-44 (Path Equivalence) and CWE-502 (Deserialization of Untrusted Data). This flaw affects multiple versions of Apache Tomcat, specifically from 11.0.0-M1 through 11.0.2, 10.1.0-M1 through 10.1.34, 9.0.0.M1 through 9.0.98, and also older EOL versions such as 8.5.0 through 8.5.100. The vulnerability is linked to the Default Servlet's handling of file uploads when write permissions are enabled (which is disabled by default) and partial PUT support is active (enabled by default). The vulnerability enables attackers to exploit the path equivalence of files with internal dots to perform unauthorized actions under certain conditions. If the Default Servlet is write-enabled and partial PUT requests are supported, an attacker who knows the names of security-sensitive files being uploaded can manipulate uploads to either view sensitive files, inject malicious content into them, or in more severe cases, achieve remote code execution (RCE). RCE is possible when the application uses Tomcat's file-based session persistence with the default storage location and includes a library vulnerable to deserialization attacks. This chain allows attackers to execute arbitrary code remotely without authentication or user interaction. The vulnerability's CVSS v3.1 score is 9.8 (critical), reflecting its high impact on confidentiality, integrity, and availability, combined with ease of exploitation over the network without privileges or user interaction. The Apache Software Foundation recommends upgrading affected Tomcat versions to 11.0.3, 10.1.35, or 9.0.99, where the issue is fixed. No known exploits are currently reported in the wild, but the severity and conditions for exploitation warrant immediate attention.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to Apache Tomcat's widespread use in enterprise web applications, government portals, and critical infrastructure services. Exploitation could lead to unauthorized disclosure of sensitive data, including personal data protected under GDPR, potentially resulting in regulatory fines and reputational damage. Remote code execution could allow attackers to take full control of affected servers, leading to data breaches, service disruption, or use of compromised systems as pivot points for further attacks within networks. Organizations relying on Tomcat for session persistence and file uploads are particularly vulnerable. Given the default servlet write permission is disabled by default, misconfigurations or custom deployments enabling this feature increase risk. The impact extends to availability if attackers modify or delete critical files, disrupting business operations. The vulnerability's exploitation could also facilitate supply chain attacks if used to compromise software build or deployment pipelines hosted on Tomcat servers.
Mitigation Recommendations
1. Immediate upgrade of Apache Tomcat to fixed versions 11.0.3, 10.1.35, or 9.0.99 is the most effective mitigation. 2. Audit and disable write permissions for the Default Servlet unless explicitly required; this setting is disabled by default and should remain so unless necessary. 3. Disable or restrict support for partial PUT requests if not needed, as this feature is enabled by default and is a key enabler of the exploit. 4. Review and harden file upload directories to ensure that security-sensitive files are not stored in subdirectories accessible via public upload URLs. 5. Implement strict access controls and monitoring on upload endpoints to detect anomalous partial PUT requests or unusual file modifications. 6. For applications using file-based session persistence, consider migrating to alternative session management methods or secure the default storage location with strict permissions. 7. Conduct code reviews and dependency checks to identify and update libraries vulnerable to deserialization attacks, reducing the risk of RCE. 8. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with rules targeting suspicious file upload patterns and path traversal attempts. 9. Regularly monitor security advisories from Apache and apply patches promptly to minimize exposure windows.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2025-24813: CWE-44 Path Equivalence: 'file.name' (Internal Dot) in Apache Software Foundation Apache Tomcat
Description
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-24813 is a critical vulnerability in Apache Tomcat, a widely used open-source Java Servlet Container developed by the Apache Software Foundation. The vulnerability arises from a path equivalence issue involving internal dots in file names ('file.name'), classified under CWE-44 (Path Equivalence) and CWE-502 (Deserialization of Untrusted Data). This flaw affects multiple versions of Apache Tomcat, specifically from 11.0.0-M1 through 11.0.2, 10.1.0-M1 through 10.1.34, 9.0.0.M1 through 9.0.98, and also older EOL versions such as 8.5.0 through 8.5.100. The vulnerability is linked to the Default Servlet's handling of file uploads when write permissions are enabled (which is disabled by default) and partial PUT support is active (enabled by default). The vulnerability enables attackers to exploit the path equivalence of files with internal dots to perform unauthorized actions under certain conditions. If the Default Servlet is write-enabled and partial PUT requests are supported, an attacker who knows the names of security-sensitive files being uploaded can manipulate uploads to either view sensitive files, inject malicious content into them, or in more severe cases, achieve remote code execution (RCE). RCE is possible when the application uses Tomcat's file-based session persistence with the default storage location and includes a library vulnerable to deserialization attacks. This chain allows attackers to execute arbitrary code remotely without authentication or user interaction. The vulnerability's CVSS v3.1 score is 9.8 (critical), reflecting its high impact on confidentiality, integrity, and availability, combined with ease of exploitation over the network without privileges or user interaction. The Apache Software Foundation recommends upgrading affected Tomcat versions to 11.0.3, 10.1.35, or 9.0.99, where the issue is fixed. No known exploits are currently reported in the wild, but the severity and conditions for exploitation warrant immediate attention.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to Apache Tomcat's widespread use in enterprise web applications, government portals, and critical infrastructure services. Exploitation could lead to unauthorized disclosure of sensitive data, including personal data protected under GDPR, potentially resulting in regulatory fines and reputational damage. Remote code execution could allow attackers to take full control of affected servers, leading to data breaches, service disruption, or use of compromised systems as pivot points for further attacks within networks. Organizations relying on Tomcat for session persistence and file uploads are particularly vulnerable. Given the default servlet write permission is disabled by default, misconfigurations or custom deployments enabling this feature increase risk. The impact extends to availability if attackers modify or delete critical files, disrupting business operations. The vulnerability's exploitation could also facilitate supply chain attacks if used to compromise software build or deployment pipelines hosted on Tomcat servers.
Mitigation Recommendations
1. Immediate upgrade of Apache Tomcat to fixed versions 11.0.3, 10.1.35, or 9.0.99 is the most effective mitigation. 2. Audit and disable write permissions for the Default Servlet unless explicitly required; this setting is disabled by default and should remain so unless necessary. 3. Disable or restrict support for partial PUT requests if not needed, as this feature is enabled by default and is a key enabler of the exploit. 4. Review and harden file upload directories to ensure that security-sensitive files are not stored in subdirectories accessible via public upload URLs. 5. Implement strict access controls and monitoring on upload endpoints to detect anomalous partial PUT requests or unusual file modifications. 6. For applications using file-based session persistence, consider migrating to alternative session management methods or secure the default storage location with strict permissions. 7. Conduct code reviews and dependency checks to identify and update libraries vulnerable to deserialization attacks, reducing the risk of RCE. 8. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with rules targeting suspicious file upload patterns and path traversal attempts. 9. Regularly monitor security advisories from Apache and apply patches promptly to minimize exposure windows.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2025-01-24T08:51:50.296Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 687e795da83201eaac11f328
Added to database: 7/21/2025, 5:31:09 PM
Last enriched: 8/13/2025, 12:57:33 AM
Last updated: 9/5/2025, 2:38:35 AM
Views: 33
Related Threats
CVE-2025-30288: Improper Access Control (CWE-284) in Adobe ColdFusion
HighCVE-2025-30284: Deserialization of Untrusted Data (CWE-502) in Adobe ColdFusion
HighCVE-2025-8684: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ux-themes Flatsome
MediumCVE-2025-9990: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in smackcoders WordPress Helpdesk Integration
HighCVE-2025-7445: CWE-532 Insertion of Sensitive Information into Log File in Kubernetes secrets-store-sync-controller
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.