Source: Tomcat PUT to active abuse as Apache deals with critical RCE flaw | CSO Online Author: unknown URL: https://www.csoonline.com/article/3847956/tomcat-put-to-active-abuse-as-apache-deals-with-critical-rce-flaw.html
ONE SENTENCE SUMMARY:
A critical RCE vulnerability in Apache Tomcat (CVE-2025-24813) is actively exploited, allowing attackers to gain remote control via PUT requests.
MAIN POINTS:
- Apache Tomcat has a critical remote code execution (RCE) vulnerability (CVE-2025-24813) under active exploitation.
- Attackers use a public proof-of-concept (PoC) exploit just 30 hours after disclosure.
- Exploitation requires only a single PUT API request to compromise vulnerable servers.
- PUT requests appear normal and use base64 encoding to evade detection.
- The attack leverages Tomcat’s session persistence and partial PUT request handling.
- Malicious session files uploaded via PUT requests execute remote code upon deserialization.
- The attack is unauthenticated and works if Tomcat uses file-based session storage.
- Affected versions include Tomcat 11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, and 9.0.0 M1 to 9.0.98.
- Fixed versions are 11.0.3 or later, 10.1.35 or later, and 9.0.99 or later.
- Attackers may soon escalate to uploading malicious JSP files and modifying configurations.
TAKEAWAYS:
- Organizations using vulnerable Tomcat versions should upgrade to fixed versions immediately.
- The attack method is simple, requiring no authentication for exploitation.
- Detecting the attack is difficult due to the normal appearance of PUT requests.
- Future attacks may involve broader abuse beyond session storage manipulation.
- Security teams should monitor for suspicious PUT requests and improve detection mechanisms.