Author: markt Date: Mon Mar 10 16:36:01 2025 New Revision: 1924274 URL: http://svn.apache.org/viewvc?rev=1924274&view=rev Log: Publish CVE-2025-24813
Modified: tomcat/site/trunk/docs/security-10.html tomcat/site/trunk/docs/security-11.html tomcat/site/trunk/docs/security-9.html tomcat/site/trunk/xdocs/security-10.xml tomcat/site/trunk/xdocs/security-11.xml tomcat/site/trunk/xdocs/security-9.xml Modified: tomcat/site/trunk/docs/security-10.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-10.html?rev=1924274&r1=1924273&r2=1924274&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-10.html (original) +++ tomcat/site/trunk/docs/security-10.html Mon Mar 10 16:36:01 2025 @@ -42,7 +42,49 @@ </p> </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text"> - <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in Apache Tomcat 10.1.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in Apache Tomcat 10.1.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in Apache Tomcat 10.1.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache Tomcat 10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache Tomcat 10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache Tomcat 10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache Tomcat 10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache Tomcat 10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in Apache Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in Apache Tomcat 10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache Tomcat 10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in Apache Tomcat 10.1.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in Apache Tomcat 10.1.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in Apache Tomcat 10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in Apache Tomcat 10.1.0-M14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat 10.1.0-M10</a></li><li><a href="#Fixed _in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat 10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in Apache Tomcat 10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomca t 10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in Apache Tomcat 10.1.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in Apache Tomcat 10.1.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in Apache Tomcat 10.1.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in Apache Tomcat 10.1.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache Tomcat 10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache Tomcat 10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache Tomcat 10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache Tomcat 10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache Tomcat 10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in Apache Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in Apac he Tomcat 10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache Tomcat 10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in Apache Tomcat 10.1.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in Apache Tomcat 10.1.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in Apache Tomcat 10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in Apache Tomcat 10.1.0-M14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 10.0.16</a></li><li><a href="#Fixed_in_Ap ache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat 10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat 10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in Apache Tomcat 10 .0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + </div><h3 id="Fixed_in_Apache_Tomcat_10.1.35"><span class="pull-right">2025-02-10</span> Fixed in Apache Tomcat 10.1.35</h3><div class="text"> + + <p><strong>Important: Remote Code Execution and/or Information disclosure + and/or malicious content added to uploaded files via write enabled + Default Servlet - </strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24813" rel="nofollow">CVE-2025-24813</a></p> + + <p>The original implementation of partial PUT used a temporary file based on + the user provided file name and path with the path separator replaced by + ".".</p> + + <p>If all of the following were true, a malicious user was able to view + security sensitive files and/or inject content into those files:</p> + + <ul> + <li>writes enabled for the default servlet (disabled by default)</li> + <li>support for partial PUT (enabled by default)</li> + <li>a target URL for security sensitive uploads that is a sub-directory of + a target URL for public uploads</li> + <li>attacker knowledge of the names of security sensitive files being + uploaded</li> + <li>the security sensitive files also being uploaded via partial PUT</li> + </ul> + + <p>If all of the following were true, a malicious user was able to perform + remote code execution:</p> + + <ul> + <li>writes enabled for the default servlet (disabled by default)</li> + <li>support for partial PUT (enabled by default)</li> + <li>application was using Tomcat's file based session persistence with the + default storage location</li> + <li>application included a library that may be leveraged in a + deserialization attack</li> + </ul> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/f6c01d6577cf9a1e06792be47e623d36acc3b5dc">f6c01d65</a>.</p> + + <p>The issue was made public on 10 March 2025.</p> + + <p>Affects: 10.1.0-M1 to 10.1.34</p> + </div><h3 id="Fixed_in_Apache_Tomcat_10.1.34"><span class="pull-right">2024-12-09</span> Fixed in Apache Tomcat 10.1.34</h3><div class="text"> <p><strong>Important: Remote Code Execution via write enabled Default Modified: tomcat/site/trunk/docs/security-11.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-11.html?rev=1924274&r1=1924273&r2=1924274&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-11.html (original) +++ tomcat/site/trunk/docs/security-11.html Mon Mar 10 16:36:01 2025 @@ -36,7 +36,49 @@ </p> </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text"> - <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed in Apache Tomcat 11.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed in Apache Tomcat 11.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in Apache Tomcat 11.0.0</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache Tomcat 11.0.0-M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache Tomcat 11.0.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in Apache Tomcat 11.0.0-M12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat 11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in Apache Tomcat 11.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat 11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in Apache Tomcat 11.0.0-M3</a></li></ul> + <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed in Apache Tomcat 11.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed in Apache Tomcat 11.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed in Apache Tomcat 11.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in Apache Tomcat 11.0.0</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache Tomcat 11.0.0-M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache Tomcat 11.0.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in Apache Tomcat 11.0.0-M12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat 11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in Apache Tomcat 11.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat 11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in Apache Tomcat 11.0.0-M3</a></li></ul> + </div><h3 id="Fixed_in_Apache_Tomcat_11.0.3"><span class="pull-right">2025-02-10</span> Fixed in Apache Tomcat 11.0.3</h3><div class="text"> + + <p><strong>Important: Remote Code Execution and/or Information disclosure + and/or malicious content added to uploaded files via write enabled + Default Servlet - </strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24813" rel="nofollow">CVE-2025-24813</a></p> + + <p>The original implementation of partial PUT used a temporary file based on + the user provided file name and path with the path separator replaced by + ".".</p> + + <p>If all of the following were true, a malicious user was able to view + security sensitive files and/or inject content into those files:</p> + + <ul> + <li>writes enabled for the default servlet (disabled by default)</li> + <li>support for partial PUT (enabled by default)</li> + <li>a target URL for security sensitive uploads that is a sub-directory of + a target URL for public uploads</li> + <li>attacker knowledge of the names of security sensitive files being + uploaded</li> + <li>the security sensitive files also being uploaded via partial PUT</li> + </ul> + + <p>If all of the following were true, a malicious user was able to perform + remote code execution:</p> + + <ul> + <li>writes enabled for the default servlet (disabled by default)</li> + <li>support for partial PUT (enabled by default)</li> + <li>application was using Tomcat's file based session persistence with the + default storage location</li> + <li>application included a library that may be leveraged in a + deserialization attack</li> + </ul> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/0a668e0c27f2b7ca0cc7c6eea32253b9b5ecb29c">0a668e0c</a>.</p> + + <p>The issue was made public on 10 March 2025.</p> + + <p>Affects: 11.0.0-M1 to 11.0.2</p> + </div><h3 id="Fixed_in_Apache_Tomcat_11.0.2"><span class="pull-right">2024-12-09</span> Fixed in Apache Tomcat 11.0.2</h3><div class="text"> <p><strong>Important: Remote Code Execution via write enabled Default Modified: tomcat/site/trunk/docs/security-9.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1924274&r1=1924273&r2=1924274&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-9.html (original) +++ tomcat/site/trunk/docs/security-9.html Mon Mar 10 16:36:01 2025 @@ -36,7 +36,49 @@ </p> </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text"> - <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in Apache Tomcat 9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed in Apache Tomcat 9.0.97</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in Apache Tomcat 9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed in Apache Tomcat 9.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in Apache Tomcat 9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in Apache Tomcat 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in Apache Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in Apache Tomcat 9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache Tomcat 9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in Apache Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in Apache Tomcat 9.0.71</ a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache Tomcat 9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache Tomcat 9.0.43</a ></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache Tomcat >9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache >Tomcat 9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in >Apache Tomcat 9.0.37</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache Tomcat >9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache >Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in >Apache Tomcat 9.0.31</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat >9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache >Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in >Apache Tomcat 9.0.21</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat >9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache >Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in >Apache Tomcat 9.0.16</a> </li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache Tomcat 9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in Apache Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache Tomcat 9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache Tomcat 9.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat 9.0.0.M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache Tomcat 9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache T omcat 9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat 9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat 9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in Apache Tomcat 9.0.0.M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.99">Fixed in Apache Tomcat 9.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in Apache Tomcat 9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed in Apache Tomcat 9.0.97</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in Apache Tomcat 9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed in Apache Tomcat 9.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in Apache Tomcat 9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in Apache Tomcat 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in Apache Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in Apache Tomcat 9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache Tomcat 9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in Apache Tomcat 9.0.72</ a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in Apache Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache Tomcat 9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache Tomcat 9.0.44</a ></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache Tomcat >9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache >Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in >Apache Tomcat 9.0.38</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache Tomcat >9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache >Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in >Apache Tomcat 9.0.35</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat >9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache >Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in >Apache Tomcat 9.0.29</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache Tomcat >9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache >Tomcat 9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in >Apache Tomcat 9.0.19</a> </li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache Tomcat 9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache Tomcat 9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in Apache Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache Tomcat 9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache Tomcat 9.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat 9.0.0.M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache Tomcat 9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat 9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat 9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat 9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in Apache Tomcat 9.0.0.M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + </div><h3 id="Fixed_in_Apache_Tomcat_9.0.99"><span class="pull-right">2025-02-10</span> Fixed in Apache Tomcat 9.0.99</h3><div class="text"> + + <p><strong>Important: Remote Code Execution and/or Information disclosure + and/or malicious content added to uploaded files via write enabled + Default Servlet - </strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24813" rel="nofollow">CVE-2025-24813</a></p> + + <p>The original implementation of partial PUT used a temporary file based on + the user provided file name and path with the path separator replaced by + ".".</p> + + <p>If all of the following were true, a malicious user was able to view + security sensitive files and/or inject content into those files:</p> + + <ul> + <li>writes enabled for the default servlet (disabled by default)</li> + <li>support for partial PUT (enabled by default)</li> + <li>a target URL for security sensitive uploads that is a sub-directory of + a target URL for public uploads</li> + <li>attacker knowledge of the names of security sensitive files being + uploaded</li> + <li>the security sensitive files also being uploaded via partial PUT</li> + </ul> + + <p>If all of the following were true, a malicious user was able to perform + remote code execution:</p> + + <ul> + <li>writes enabled for the default servlet (disabled by default)</li> + <li>support for partial PUT (enabled by default)</li> + <li>application was using Tomcat's file based session persistence with the + default storage location</li> + <li>application included a library that may be leveraged in a + deserialization attack</li> + </ul> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/eb61aade8f8daccaecabf07d428b877975622f72">eb61aade</a>.</p> + + <p>The issue was made public on 10 March 2025.</p> + + <p>Affects: 9.0.0.M1 to 9.0.98</p> + </div><h3 id="Fixed_in_Apache_Tomcat_9.0.98"><span class="pull-right">2024-12-09</span> Fixed in Apache Tomcat 9.0.98</h3><div class="text"> <p><strong>Important: Remote Code Execution via write enabled Default Modified: tomcat/site/trunk/xdocs/security-10.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-10.xml?rev=1924274&r1=1924273&r2=1924274&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-10.xml (original) +++ tomcat/site/trunk/xdocs/security-10.xml Mon Mar 10 16:36:01 2025 @@ -56,6 +56,50 @@ <toc/> </section> + <section name="Fixed in Apache Tomcat 10.1.35" rtext="2025-02-10"> + + <p><strong>Important: Remote Code Execution and/or Information disclosure + and/or malicious content added to uploaded files via write enabled + Default Servlet - </strong> <cve>CVE-2025-24813</cve></p> + + <p>The original implementation of partial PUT used a temporary file based on + the user provided file name and path with the path separator replaced by + ".".</p> + + <p>If all of the following were true, a malicious user was able to view + security sensitive files and/or inject content into those files:</p> + + <ul> + <li>writes enabled for the default servlet (disabled by default)</li> + <li>support for partial PUT (enabled by default)</li> + <li>a target URL for security sensitive uploads that is a sub-directory of + a target URL for public uploads</li> + <li>attacker knowledge of the names of security sensitive files being + uploaded</li> + <li>the security sensitive files also being uploaded via partial PUT</li> + </ul> + + <p>If all of the following were true, a malicious user was able to perform + remote code execution:</p> + + <ul> + <li>writes enabled for the default servlet (disabled by default)</li> + <li>support for partial PUT (enabled by default)</li> + <li>application was using Tomcat's file based session persistence with the + default storage location</li> + <li>application included a library that may be leveraged in a + deserialization attack</li> + </ul> + + <p>This was fixed with commit + <hashlink hash="f6c01d6577cf9a1e06792be47e623d36acc3b5dc"/>.</p> + + <p>The issue was made public on 10 March 2025.</p> + + <p>Affects: 10.1.0-M1 to 10.1.34</p> + + </section> + <section name="Fixed in Apache Tomcat 10.1.34" rtext="2024-12-09"> <p><strong>Important: Remote Code Execution via write enabled Default Modified: tomcat/site/trunk/xdocs/security-11.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-11.xml?rev=1924274&r1=1924273&r2=1924274&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-11.xml (original) +++ tomcat/site/trunk/xdocs/security-11.xml Mon Mar 10 16:36:01 2025 @@ -50,6 +50,50 @@ <toc/> </section> + <section name="Fixed in Apache Tomcat 11.0.3" rtext="2025-02-10"> + + <p><strong>Important: Remote Code Execution and/or Information disclosure + and/or malicious content added to uploaded files via write enabled + Default Servlet - </strong> <cve>CVE-2025-24813</cve></p> + + <p>The original implementation of partial PUT used a temporary file based on + the user provided file name and path with the path separator replaced by + ".".</p> + + <p>If all of the following were true, a malicious user was able to view + security sensitive files and/or inject content into those files:</p> + + <ul> + <li>writes enabled for the default servlet (disabled by default)</li> + <li>support for partial PUT (enabled by default)</li> + <li>a target URL for security sensitive uploads that is a sub-directory of + a target URL for public uploads</li> + <li>attacker knowledge of the names of security sensitive files being + uploaded</li> + <li>the security sensitive files also being uploaded via partial PUT</li> + </ul> + + <p>If all of the following were true, a malicious user was able to perform + remote code execution:</p> + + <ul> + <li>writes enabled for the default servlet (disabled by default)</li> + <li>support for partial PUT (enabled by default)</li> + <li>application was using Tomcat's file based session persistence with the + default storage location</li> + <li>application included a library that may be leveraged in a + deserialization attack</li> + </ul> + + <p>This was fixed with commit + <hashlink hash="0a668e0c27f2b7ca0cc7c6eea32253b9b5ecb29c"/>.</p> + + <p>The issue was made public on 10 March 2025.</p> + + <p>Affects: 11.0.0-M1 to 11.0.2</p> + + </section> + <section name="Fixed in Apache Tomcat 11.0.2" rtext="2024-12-09"> <p><strong>Important: Remote Code Execution via write enabled Default Modified: tomcat/site/trunk/xdocs/security-9.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1924274&r1=1924273&r2=1924274&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-9.xml (original) +++ tomcat/site/trunk/xdocs/security-9.xml Mon Mar 10 16:36:01 2025 @@ -50,6 +50,50 @@ <toc/> </section> + <section name="Fixed in Apache Tomcat 9.0.99" rtext="2025-02-10"> + + <p><strong>Important: Remote Code Execution and/or Information disclosure + and/or malicious content added to uploaded files via write enabled + Default Servlet - </strong> <cve>CVE-2025-24813</cve></p> + + <p>The original implementation of partial PUT used a temporary file based on + the user provided file name and path with the path separator replaced by + ".".</p> + + <p>If all of the following were true, a malicious user was able to view + security sensitive files and/or inject content into those files:</p> + + <ul> + <li>writes enabled for the default servlet (disabled by default)</li> + <li>support for partial PUT (enabled by default)</li> + <li>a target URL for security sensitive uploads that is a sub-directory of + a target URL for public uploads</li> + <li>attacker knowledge of the names of security sensitive files being + uploaded</li> + <li>the security sensitive files also being uploaded via partial PUT</li> + </ul> + + <p>If all of the following were true, a malicious user was able to perform + remote code execution:</p> + + <ul> + <li>writes enabled for the default servlet (disabled by default)</li> + <li>support for partial PUT (enabled by default)</li> + <li>application was using Tomcat's file based session persistence with the + default storage location</li> + <li>application included a library that may be leveraged in a + deserialization attack</li> + </ul> + + <p>This was fixed with commit + <hashlink hash="eb61aade8f8daccaecabf07d428b877975622f72"/>.</p> + + <p>The issue was made public on 10 March 2025.</p> + + <p>Affects: 9.0.0.M1 to 9.0.98</p> + + </section> + <section name="Fixed in Apache Tomcat 9.0.98" rtext="2024-12-09"> <p><strong>Important: Remote Code Execution via write enabled Default --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org