Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Apache Tomcat vulnerability is actively exploited only 30 hours after public disclosure
Global Security

Apache Tomcat vulnerability is actively exploited only 30 hours after public disclosure

AdminBy AdminMarch 17, 2025No Comments3 Mins Read
Apache Tomcat Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 17, 2025Red LakshmananVulnerability / safety online

Apache Tomcat vulnerability

The recently disclosed lack of security, which affects Apache Tomcat, was actively exploited in the wild after publishing public evidence (POC) only 30 hours after public disclosure.

Vulnerability tracked as Cve-2025-24813affects the above versions –

  • Apache Tomcat 11.0-M1 to 11.0.2
  • Apache Tomcat 10.0-M1 to 10.1.34
  • Apache Tomcat 9.0-M1 to 9.0.98

This concerns the case

  • Record the Enable for the default serulet (disabled by default)
  • Partial Class Support (Enabled by default)
  • Target URL for sensitive safety is loaded, which is the submarine target URL for public downloads
  • Knowledge of the attacker about the names that feel the security of the files that are loaded
  • Files sensitive to safety are also loaded by partial application

Successful operation can allow a malicious user to view security files or introduce arbitrary content into these files by request.

In addition, the attacker can reach the remote code if all subsequent conditions are true –

  • Record the Enable for the default serulet (disabled by default)
  • Partial Class Support (Enabled by default)
  • Application used the Tomcat Session Suspit based on the default storage location
  • The application included a library that could be used in the desserization attack

In a recommendation published last week, the project supports – Note The vulnerability was resolved in the versions of Tomcat 9.0.99, 10.1.35 and 11.0.3.

Cybersecurity

But with respect to the turn, the vulnerability already sees the attempts to operate in the wild, on Wallaralm.

“This attack uses the Tomcat Session Mechanism along with its support partial requests,” “company – Note.

“Operations works in two stages: the attacker loads a serialized Java session file through the request. The attacker causes desserization, citing the malicious session ID in the GET request.”

Speaking otherwise, the attacks entry the sending request containing a serialized useful load of Java, which contains Base64, which is written in the Tomcat storage catalog, which is subsequently executed during desserization, sending a GetSionid request to the angry session.

Wallarm also noted that the trivial vulnerability and does not require authenticity check. The only prerequisite is that Tomcat uses a file-based repository.

“While this operation is abusing the session, a greater problem is partially processing in Tomcat, allowing you to download almost any file anywhere,” – added in it. “In the near future, the attackers will start to change their tactics, download malicious JSP files, change configurations and put back repository by sessions.”

Users who work with the affected Tomcat versions are recommended to update their instances as soon as possible to mitigate potential threats.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.