{"id":"CVE-2025-24813","details":"Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nIf all of the following were true, a malicious user was able to view       security sensitive files and/or inject content into those files:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads\n- attacker knowledge of the names of security sensitive files being uploaded\n- the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to       perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- application was using Tomcat's file based session persistence with the default storage location\n- application included a library that may be leveraged in a deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.","aliases":["BIT-tomcat-2025-24813","GHSA-83qj-6fr2-vhqg"],"modified":"2026-04-16T04:34:07.704259337Z","published":"2025-03-10T17:15:35.067Z","related":["ALSA-2025:3645","ALSA-2025:3683","ALSA-2025:7494","ALSA-2025:7497","CGA-xvpq-3fmc-q2jr","SUSE-SU-2025:0954-1","SUSE-SU-2025:1024-1","SUSE-SU-2025:1126-1","SUSE-SU-2026:1058-1","openSUSE-SU-2025:14896-1","openSUSE-SU-2025:14897-1"],"references":[{"type":"ADVISORY","url":"https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2025/03/10/5"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2025/04/msg00003.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20250321-0001/"},{"type":"ADVISORY","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24813"},{"type":"REPORT","url":"https://www.vicarius.io/vsociety/posts/cve-2025-24813-detect-apache-tomcat-rce"},{"type":"REPORT","url":"https://www.vicarius.io/vsociety/posts/cve-2025-24813-mitigate-apache-tomcat-rce"},{"type":"REPORT","url":"https://www.vicarius.io/vsociety/posts/cve-2025-24813-tomcat-mitigation-vulnerability"},{"type":"REPORT","url":"https://www.vicarius.io/vsociety/posts/cve-2025-24813-tomcat-detect-vulnerability"},{"type":"EVIDENCE","url":"https://github.com/absholi7ly/POC-CVE-2025-24813/blob/main/README.md"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/tomcat","events":[{"introduced":"0"},{"fixed":"7145107845fe82dafee783bb0bfd6bea028e173b"},{"introduced":"934df02dc68e72b95a38f372017f1b89b0d13a76"},{"fixed":"9636e5188311f30c1e46c94191d2145998778bf4"},{"introduced":"6c56147c3966fde5ae34aab2b253593e8700a28c"},{"fixed":"6e6ddf18b5dd4baadd4470f2f48a71b9c4185122"},{"introduced":"0"},{"last_affected":"f2ab9ac8bc3f40ee9b2cb50b030c99df927f0429"},{"introduced":"0"},{"last_affected":"dc3639dd7123301ced18dbf4ddf2dca93704870d"},{"introduced":"0"},{"last_affected":"049799677ba307378a256621bb1a7b03f597571c"},{"introduced":"0"},{"last_affected":"d08498a3cefa7206bad791acf019455794f865ea"},{"introduced":"0"},{"last_affected":"faa2582152d9dcbcb444700df340e10a85fc375f"},{"introduced":"0"},{"last_affected":"02e84c839def0228475fad85d0b19abc2f70b03f"},{"introduced":"0"},{"last_affected":"dcf3e81b2e709574971c7a9592614d70c1b55bf7"},{"introduced":"0"},{"last_affected":"02c4004b52be88a04a7372577d56da0f9ed3a7fe"},{"introduced":"0"},{"last_affected":"7a261dff58bc9581317c400b5c0fa4f7ae371fda"},{"introduced":"0"},{"last_affected":"ae9df1bcc169a5b03adea54c8c19ca9bd902e44f"},{"introduced":"0"},{"last_affected":"ff0b6c231b7a1a416688346fdd299a3d6cfb5b64"},{"introduced":"0"},{"last_affected":"0e59fedb28df646930c5aff945159b64d7a52260"},{"introduced":"0"},{"last_affected":"920e86e465fc9db8b0c21b684b42456179308cfd"},{"introduced":"0"},{"last_affected":"8778a44d6323c1066237043a89ab2f36696916b1"},{"introduced":"0"},{"last_affected":"e706972942e2c342e4a37baf5e2596f11e8a0e94"},{"introduced":"0"},{"last_affected":"2a10c8d9110d7b1c7f526f3352648c6b19ba2c52"},{"introduced":"0"},{"last_affected":"51d1031c36c0f2b3ee1e0d14b56228a559144153"},{"introduced":"0"},{"last_affected":"0f3f1e439a040068b741d77777766722e4420ad6"},{"introduced":"0"},{"last_affected":"cd53876fefaa370c31466b0f615e9ad026541a27"},{"introduced":"0"},{"last_affected":"02d546ba3c553c74ff1a99ecc166a6ff9c501ba8"},{"introduced":"0"},{"last_affected":"59c81e30e2f64f5e8c1db78c4860c51850dfb0bd"},{"introduced":"0"},{"last_affected":"06d0e42e6cd70aae860f164c27d16bdfdfcdc496"},{"introduced":"0"},{"last_affected":"ae109f6248e00a1952f706d6941ff930ad4466e1"},{"introduced":"0"},{"last_affected":"5a67c7c58d8caf24969093e6423b7f0b43df2f6a"},{"introduced":"0"},{"last_affected":"de45b3f200602b98cde70debe7f656bef0bb5fa2"},{"introduced":"0"},{"last_affected":"9108a1f6776f7211f5cd27e80b7b5a6e98116b01"},{"introduced":"0"},{"last_affected":"a22029c7147b83e4fbced16add744903245d1147"},{"introduced":"0"},{"last_affected":"ca6ea22e9b6c47df1db85e9af80f80431c3ea19e"},{"introduced":"0"},{"last_affected":"110bc36637569f7e9d191d21ac8600a8667cfc94"},{"introduced":"0"},{"last_affected":"eee0dbb29048a60ee2c85ebcb9abb1750046c0bf"},{"introduced":"0"},{"last_affected":"19e301275f23056e3c46ab296c87cf6e16fbe68f"},{"introduced":"0"},{"last_affected":"4b03c23ad60e678c1d1a85df815fb6cd8d14ca67"},{"introduced":"0"},{"last_affected":"c400bf727cbc10198d3f52c29849d18660050b0c"},{"introduced":"0"},{"last_affected":"2acc5c10a303d6ae7a28c2959432aef98ae29016"},{"introduced":"0"},{"last_affected":"6c03e2dc6390ccb3dbe714889706fcad2f08f4c5"},{"introduced":"0"},{"last_affected":"2bf2c6a691ad9f2cf68363123419909cebbb308a"},{"introduced":"0"},{"last_affected":"5301df36454fcf22081108e25199f29904cadc79"},{"introduced":"0"},{"last_affected":"fafe3dc7a63c12fbb45aa076c90d6a9e7f77e5c8"},{"introduced":"0"},{"last_affected":"8afe2647d7801172cc304f4a47d8aad9646d2985"},{"introduced":"0"},{"last_affected":"3b6de549bdf4f6486c39daa0ae8e4d4b7475b1f6"},{"introduced":"0"},{"last_affected":"06977fbea3c82c3d29e544203983dd3b49a632f1"},{"introduced":"0"},{"last_affected":"9ce010463a93138d596c54c67b11cdb35fc8244a"},{"introduced":"0"},{"last_affected":"eb9d5f0b70a1b84fa18af30eaf358cfa9e4b87ae"},{"introduced":"0"},{"last_affected":"434400d882a20e12ea03855f4bd93451bd3362c6"},{"introduced":"0"},{"last_affected":"de714a23642a4d0baef342db6762a7f7a550d82c"},{"introduced":"0"},{"last_affected":"56e547d387ab49f688c93fe9ca082b1b5d94deed"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"9.0.99"},{"introduced":"10.1.1"},{"fixed":"10.1.35"},{"introduced":"11.0.1"},{"fixed":"11.0.3"},{"introduced":"0"},{"last_affected":"10.1.0-milestone1"},{"introduced":"0"},{"last_affected":"10.1.0-milestone10"},{"introduced":"0"},{"last_affected":"10.1.0-milestone11"},{"introduced":"0"},{"last_affected":"10.1.0-milestone12"},{"introduced":"0"},{"last_affected":"10.1.0-milestone13"},{"introduced":"0"},{"last_affected":"10.1.0-milestone14"},{"introduced":"0"},{"last_affected":"10.1.0-milestone15"},{"introduced":"0"},{"last_affected":"10.1.0-milestone16"},{"introduced":"0"},{"last_affected":"10.1.0-milestone17"},{"introduced":"0"},{"last_affected":"10.1.0-milestone18"},{"introduced":"0"},{"last_affected":"10.1.0-milestone19"},{"introduced":"0"},{"last_affected":"10.1.0-milestone2"},{"introduced":"0"},{"last_affected":"10.1.0-milestone20"},{"introduced":"0"},{"last_affected":"10.1.0-milestone3"},{"introduced":"0"},{"last_affected":"10.1.0-milestone4"},{"introduced":"0"},{"last_affected":"10.1.0-milestone5"},{"introduced":"0"},{"last_affected":"10.1.0-milestone6"},{"introduced":"0"},{"last_affected":"10.1.0-milestone7"},{"introduced":"0"},{"last_affected":"10.1.0-milestone8"},{"introduced":"0"},{"last_affected":"10.1.0-milestone9"},{"introduced":"0"},{"last_affected":"11.0.0-milestone1"},{"introduced":"0"},{"last_affected":"11.0.0-milestone10"},{"introduced":"0"},{"last_affected":"11.0.0-milestone11"},{"introduced":"0"},{"last_affected":"11.0.0-milestone12"},{"introduced":"0"},{"last_affected":"11.0.0-milestone13"},{"introduced":"0"},{"last_affected":"11.0.0-milestone14"},{"introduced":"0"},{"last_affected":"11.0.0-milestone15"},{"introduced":"0"},{"last_affected":"11.0.0-milestone16"},{"introduced":"0"},{"last_affected":"11.0.0-milestone17"},{"introduced":"0"},{"last_affected":"11.0.0-milestone18"},{"introduced":"0"},{"last_affected":"11.0.0-milestone19"},{"introduced":"0"},{"last_affected":"11.0.0-milestone2"},{"introduced":"0"},{"last_affected":"11.0.0-milestone20"},{"introduced":"0"},{"last_affected":"11.0.0-milestone21"},{"introduced":"0"},{"last_affected":"11.0.0-milestone22"},{"introduced":"0"},{"last_affected":"11.0.0-milestone23"},{"introduced":"0"},{"last_affected":"11.0.0-milestone24"},{"introduced":"0"},{"last_affected":"11.0.0-milestone25"},{"introduced":"0"},{"last_affected":"11.0.0-milestone3"},{"introduced":"0"},{"last_affected":"11.0.0-milestone4"},{"introduced":"0"},{"last_affected":"11.0.0-milestone5"},{"introduced":"0"},{"last_affected":"11.0.0-milestone6"},{"introduced":"0"},{"last_affected":"11.0.0-milestone7"},{"introduced":"0"},{"last_affected":"11.0.0-milestone8"},{"introduced":"0"},{"last_affected":"11.0.0-milestone9"},{"introduced":"0"},{"last_affected":"11.0"}]}}],"versions":["10.1.0-M1","10.1.0-M10","10.1.0-M11","10.1.0-M12","10.1.0-M13","10.1.0-M14","10.1.0-M15","10.1.0-M16","10.1.0-M17","10.1.0-M18","10.1.0-M19","10.1.0-M2","10.1.0-M20","10.1.0-M3","10.1.0-M4","10.1.0-M5","10.1.0-M6","10.1.0-M7","10.1.0-M8","10.1.0-M9","11.0.0","11.0.0-M1","11.0.0-M10","11.0.0-M11","11.0.0-M12","11.0.0-M13","11.0.0-M14","11.0.0-M15","11.0.0-M16","11.0.0-M17","11.0.0-M18","11.0.0-M19","11.0.0-M2","11.0.0-M20","11.0.0-M21","11.0.0-M22","11.0.0-M23","11.0.0-M24","11.0.0-M25","11.0.0-M3","11.0.0-M4","11.0.0-M5","11.0.0-M6","11.0.0-M7","11.0.0-M8","11.0.0-M9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-24813.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}