Skip to main content

CVE-2025-24813: CWE-44 Path Equivalence: 'file.name' (Internal Dot) in Apache Software Foundation Apache Tomcat

Critical
VulnerabilityCVE-2025-24813cvecve-2025-24813cwe-44cwe-502
Published: Mon Mar 10 2025 (03/10/2025, 16:44:03 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat

Description

Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.

AI-Powered Analysis

AILast updated: 08/13/2025, 00:57:33 UTC

Technical Analysis

CVE-2025-24813 is a critical vulnerability in Apache Tomcat, a widely used open-source Java Servlet Container developed by the Apache Software Foundation. The vulnerability arises from a path equivalence issue involving internal dots in file names ('file.name'), classified under CWE-44 (Path Equivalence) and CWE-502 (Deserialization of Untrusted Data). This flaw affects multiple versions of Apache Tomcat, specifically from 11.0.0-M1 through 11.0.2, 10.1.0-M1 through 10.1.34, 9.0.0.M1 through 9.0.98, and also older EOL versions such as 8.5.0 through 8.5.100. The vulnerability is linked to the Default Servlet's handling of file uploads when write permissions are enabled (which is disabled by default) and partial PUT support is active (enabled by default). The vulnerability enables attackers to exploit the path equivalence of files with internal dots to perform unauthorized actions under certain conditions. If the Default Servlet is write-enabled and partial PUT requests are supported, an attacker who knows the names of security-sensitive files being uploaded can manipulate uploads to either view sensitive files, inject malicious content into them, or in more severe cases, achieve remote code execution (RCE). RCE is possible when the application uses Tomcat's file-based session persistence with the default storage location and includes a library vulnerable to deserialization attacks. This chain allows attackers to execute arbitrary code remotely without authentication or user interaction. The vulnerability's CVSS v3.1 score is 9.8 (critical), reflecting its high impact on confidentiality, integrity, and availability, combined with ease of exploitation over the network without privileges or user interaction. The Apache Software Foundation recommends upgrading affected Tomcat versions to 11.0.3, 10.1.35, or 9.0.99, where the issue is fixed. No known exploits are currently reported in the wild, but the severity and conditions for exploitation warrant immediate attention.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to Apache Tomcat's widespread use in enterprise web applications, government portals, and critical infrastructure services. Exploitation could lead to unauthorized disclosure of sensitive data, including personal data protected under GDPR, potentially resulting in regulatory fines and reputational damage. Remote code execution could allow attackers to take full control of affected servers, leading to data breaches, service disruption, or use of compromised systems as pivot points for further attacks within networks. Organizations relying on Tomcat for session persistence and file uploads are particularly vulnerable. Given the default servlet write permission is disabled by default, misconfigurations or custom deployments enabling this feature increase risk. The impact extends to availability if attackers modify or delete critical files, disrupting business operations. The vulnerability's exploitation could also facilitate supply chain attacks if used to compromise software build or deployment pipelines hosted on Tomcat servers.

Mitigation Recommendations

1. Immediate upgrade of Apache Tomcat to fixed versions 11.0.3, 10.1.35, or 9.0.99 is the most effective mitigation. 2. Audit and disable write permissions for the Default Servlet unless explicitly required; this setting is disabled by default and should remain so unless necessary. 3. Disable or restrict support for partial PUT requests if not needed, as this feature is enabled by default and is a key enabler of the exploit. 4. Review and harden file upload directories to ensure that security-sensitive files are not stored in subdirectories accessible via public upload URLs. 5. Implement strict access controls and monitoring on upload endpoints to detect anomalous partial PUT requests or unusual file modifications. 6. For applications using file-based session persistence, consider migrating to alternative session management methods or secure the default storage location with strict permissions. 7. Conduct code reviews and dependency checks to identify and update libraries vulnerable to deserialization attacks, reducing the risk of RCE. 8. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with rules targeting suspicious file upload patterns and path traversal attempts. 9. Regularly monitor security advisories from Apache and apply patches promptly to minimize exposure windows.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-01-24T08:51:50.296Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687e795da83201eaac11f328

Added to database: 7/21/2025, 5:31:09 PM

Last enriched: 8/13/2025, 12:57:33 AM

Last updated: 9/5/2025, 2:38:35 AM

Views: 33

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats