Source: Tomcat PUT to active abuse as Apache deals with critical RCE flaw | CSO Online Author: unknown URL: https://www.csoonline.com/article/3847956/tomcat-put-to-active-abuse-as-apache-deals-with-critical-rce-flaw.html
-
ONE SENTENCE SUMMARY: A critical RCE vulnerability in Apache Tomcat (CVE-2025-24813) is actively exploited, allowing attackers to gain remote control via PUT requests.
-
MAIN POINTS:
-
Apache Tomcat has a critical remote code execution (RCE) vulnerability (CVE-2025-24813) under active exploitation.
-
Attackers use a public proof-of-concept (PoC) exploit just 30 hours after disclosure.
-
Exploitation requires only a single PUT API request to compromise vulnerable servers.
-
PUT requests appear normal and use base64 encoding to evade detection.
-
The attack leverages Tomcat’s session persistence and partial PUT request handling.
-
Malicious session files uploaded via PUT requests execute remote code upon deserialization.
-
The attack is unauthenticated and works if Tomcat uses file-based session storage.
-
Affected versions include Tomcat 11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, and 9.0.0 M1 to 9.0.98.
-
Fixed versions are 11.0.3 or later, 10.1.35 or later, and 9.0.99 or later.
-
Attackers may soon escalate to uploading malicious JSP files and modifying configurations.
-
TAKEAWAYS:
-
Organizations using vulnerable Tomcat versions should upgrade to fixed versions immediately.
-
The attack method is simple, requiring no authentication for exploitation.
-
Detecting the attack is difficult due to the normal appearance of PUT requests.
-
Future attacks may involve broader abuse beyond session storage manipulation.
-
Security teams should monitor for suspicious PUT requests and improve detection mechanisms.