Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Apache Tomcat vulnerability is actively exploited only 30 hours after public disclosure
Global Security

Apache Tomcat vulnerability is actively exploited only 30 hours after public disclosure

AdminBy AdminMarch 17, 2025No Comments3 Mins Read
Apache Tomcat Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 17, 2025Red LakshmananVulnerability / safety online

Apache Tomcat vulnerability

The recently disclosed lack of security, which affects Apache Tomcat, was actively exploited in the wild after publishing public evidence (POC) only 30 hours after public disclosure.

Vulnerability tracked as Cve-2025-24813affects the above versions –

  • Apache Tomcat 11.0-M1 to 11.0.2
  • Apache Tomcat 10.0-M1 to 10.1.34
  • Apache Tomcat 9.0-M1 to 9.0.98

This concerns the case

  • Record the Enable for the default serulet (disabled by default)
  • Partial Class Support (Enabled by default)
  • Target URL for sensitive safety is loaded, which is the submarine target URL for public downloads
  • Knowledge of the attacker about the names that feel the security of the files that are loaded
  • Files sensitive to safety are also loaded by partial application

Successful operation can allow a malicious user to view security files or introduce arbitrary content into these files by request.

In addition, the attacker can reach the remote code if all subsequent conditions are true –

  • Record the Enable for the default serulet (disabled by default)
  • Partial Class Support (Enabled by default)
  • Application used the Tomcat Session Suspit based on the default storage location
  • The application included a library that could be used in the desserization attack

In a recommendation published last week, the project supports – Note The vulnerability was resolved in the versions of Tomcat 9.0.99, 10.1.35 and 11.0.3.

Cybersecurity

But with respect to the turn, the vulnerability already sees the attempts to operate in the wild, on Wallaralm.

“This attack uses the Tomcat Session Mechanism along with its support partial requests,” “company – Note.

“Operations works in two stages: the attacker loads a serialized Java session file through the request. The attacker causes desserization, citing the malicious session ID in the GET request.”

Speaking otherwise, the attacks entry the sending request containing a serialized useful load of Java, which contains Base64, which is written in the Tomcat storage catalog, which is subsequently executed during desserization, sending a GetSionid request to the angry session.

Wallarm also noted that the trivial vulnerability and does not require authenticity check. The only prerequisite is that Tomcat uses a file-based repository.

“While this operation is abusing the session, a greater problem is partially processing in Tomcat, allowing you to download almost any file anywhere,” – added in it. “In the near future, the attackers will start to change their tactics, download malicious JSP files, change configurations and put back repository by sessions.”

Users who work with the affected Tomcat versions are recommended to update their instances as soon as possible to mitigate potential threats.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.