Author: markt
Date: Mon Oct 27 17:12:06 2025
New Revision: 1929379
Log:
Add details for CVE-2025-55752, CVEW-2025-55754 and CVE-2025-61795
Modified:
tomcat/site/trunk/docs/security-10.html
tomcat/site/trunk/docs/security-11.html
tomcat/site/trunk/docs/security-9.html
tomcat/site/trunk/xdocs/security-10.xml
tomcat/site/trunk/xdocs/security-11.xml
tomcat/site/trunk/xdocs/security-9.xml
Modified: tomcat/site/trunk/docs/security-10.html
==============================================================================
--- tomcat/site/trunk/docs/security-10.html Mon Oct 27 15:54:16 2025
(r1929378)
+++ tomcat/site/trunk/docs/security-10.html Mon Oct 27 17:12:06 2025
(r1929379)
@@ -42,7 +42,72 @@
</p>
</div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
- <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.44">Fixed in Apache Tomcat
10.1.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.43">Fixed in Apache
Tomcat 10.1.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.42">Fixed in
Apache Tomcat 10.1.42</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.41">Fixed in Apache Tomcat
10.1.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.40">Fixed in Apache
Tomcat 10.1.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in
Apache Tomcat 10.1.35</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in Apache Tomcat
10.1.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in Apache
Tomcat 10.1.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in
Apache Tomcat 10.1.31</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache Tomcat
10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache
Tomcat 10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in
Apache Tomcat 10.1.16</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache Tomcat
10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache
Tomcat 10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in
Apache Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed
in Apache Tomcat 10.1.8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in Apache Tomcat
10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache
Tomcat 10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in
Apache Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed
in Apache Tomcat 10.1.1</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat
10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache
Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed
in Apache Tomcat 10.1.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_
10.0.21">Fixed in Apache Tomcat 10.0.21</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in Apache Tomcat
10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in
Apache Tomcat 10.0.20</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in Apache Tomcat
10.1.0-M14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in
Apache Tomcat 10.0.16</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat
10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in
Apache Tomcat 10.0.12</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat
10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache
Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in
Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed
in Apache Tomcat 10.0.5</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 10.0.4</a></li>
<li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache Tomcat
10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache
Tomcat 10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed
in Apache Tomcat 10.0.0-M8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in
Apache Tomcat 10.0.0-M6</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat
10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a
vulnerability in Tomcat</a></li></ul>
+ <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.47">Fixed in Apache Tomcat
10.1.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.45">Fixed in Apache
Tomcat 10.1.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.44">Fixed in
Apache Tomcat 10.1.44</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.43">Fixed in Apache Tomcat
10.1.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.42">Fixed in Apache
Tomcat 10.1.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.41">Fixed in
Apache Tomcat 10.1.41</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.40">Fixed in Apache Tomcat
10.1.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in Apache
Tomcat 10.1.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in
Apache Tomcat 10.1.34</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in Apache Tomcat
10.1.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in Apache
Tomcat 10.1.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in
Apache Tomcat 10.1.25</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache Tomcat
10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache
Tomcat 10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in
Apache Tomcat 10.1.14</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache Tomcat
10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache
Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in
Apache Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed
in Apache Tomcat 10.1.6</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache Tomcat
10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache
Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in
Apache Tomcat 10.1.1</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat
10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2
3">Fixed in Apache Tomcat 10.0.23</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in Apache Tomcat
10.1.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in
Apache Tomcat 10.0.21</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in Apache Tomcat
10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in
Apache Tomcat 10.0.20</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in Apache Tomcat
10.1.0-M14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in
Apache Tomcat 10.0.16</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat
10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in
Apache Tomcat 10.0.12</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat
10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache
Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in
Apache Tomcat 10.0.6</a><
/li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat
10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache
Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in
Apache Tomcat 10.0.2</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat
10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in
Apache Tomcat 10.0.0-M8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in
Apache Tomcat 10.0.0-M6</a></li><li><a
href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat
10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a
vulnerability in Tomcat</a></li></ul>
+ </div><h3 id="Fixed_in_Apache_Tomcat_10.1.47"><span
class="pull-right">2025-10-07</span> Fixed in Apache Tomcat 10.1.47</h3><div
class="text">
+
+ <p><strong>Low: Delayed cleaning of multipart upload temporary files may
+ lead to DoS</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61795"
rel="nofollow">CVE-2025-61795</a></p>
+
+ <p>If an error occurred (including exceeding limits) during the processing
+ of a multipart upload, temporary copies of the uploaded parts written to
+ disc were not cleaned up immediately but left for the garbage collection
+ process to delete. Depending on JVM settings, application memory usage
+ and application load, it was possible that space for the temporary
copies
+ of uploaded parts would be filled faster than GC cleared it, leading to
a
+ DoS.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/af6e9181620304c0d818121c29c074e1330610d0">af6e9181</a>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.46</p>
+
+ </div><h3 id="Fixed_in_Apache_Tomcat_10.1.45"><span
class="pull-right">2025-09-08</span> Fixed in Apache Tomcat 10.1.45</h3><div
class="text">
+
+ <p><strong>Low: Console manipulation via escape sequences in log
+ messages</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55754"
rel="nofollow">CVE-2025-55754</a></p>
+
+ <p>Tomcat did not escape ANSI escape sequences in log messages. If Tomcat
+ was running in a console on a Windows operating system, and the console
+ supported ANSI escape sequences, it was possible for an attacker to use
a
+ specially crafted URL to inject ANSI escape sequences to manipulate the
+ console and the clip-board and attempt to trick an administrator into
+ running an attacker controlled command. While no attack vector was
found,
+ it may have been possible to mount this attack on other operating
+ systems.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/138d7f5cfaae683078948303333c080e6faa75d2">138d7f5c</a>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.44</p>
+
+ <p><strong>Important: Directory traversal via Rewrite Valve with possible
+ remote code execution if PUT is enabled</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55752"
rel="nofollow">CVE-2025-55752</a></p>
+
+ <p>The fix for bug <a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=60013">60013</a>
introduced a regression where the
+ rewritten URL was normalized before it was decoded. This introduced the
+ possibility that, for rewrite rules that rewrite query parameters to the
+ URL, an attacker could manipulate the request URI to bypass security
+ constraints including the protection for <code>/WEB-INF/</code> and
+ <code>/META-INF/</code>. If PUT requests were also enabled then
malicious
+ files could be uploaded leading to remote code execution. PUT requests
+ are normally limited to trusted users and it is considered unlikely that
+ PUT requests would be enabled in conjunction with a rewrite that
+ manipulated the URI.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/130d36d8492ef9e4eb22952c17c92423cb35fd06">130d36d8</a>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.44</p>
+
</div><h3 id="Fixed_in_Apache_Tomcat_10.1.44"><span
class="pull-right">2025-08-07</span> Fixed in Apache Tomcat 10.1.44</h3><div
class="text">
<p><strong>Important: DoS in HTTP/2 due to client triggered stream
Modified: tomcat/site/trunk/docs/security-11.html
==============================================================================
--- tomcat/site/trunk/docs/security-11.html Mon Oct 27 15:54:16 2025
(r1929378)
+++ tomcat/site/trunk/docs/security-11.html Mon Oct 27 17:12:06 2025
(r1929379)
@@ -36,7 +36,72 @@
</p>
</div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
- <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.10">Fixed in Apache Tomcat
11.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.9">Fixed in Apache
Tomcat 11.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.8">Fixed in
Apache Tomcat 11.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.7">Fixed
in Apache Tomcat 11.0.7</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.6">Fixed in Apache Tomcat
11.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed in Apache
Tomcat 11.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed in
Apache Tomcat 11.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed
in Apache Tomcat 11.0.1</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in Apache Tomcat
11.0.0</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache
Tomcat 11.0.0-M21</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache Tomcat
11.0.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in
Apache Tomcat 11.0.0-M12</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat
11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in
Apache Tomcat 11.0.0-M6</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat
11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in
Apache Tomcat 11.0.0-M3</a></li></ul>
+ <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.12">Fixed in Apache Tomcat
11.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.11">Fixed in Apache
Tomcat 11.0.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.10">Fixed in
Apache Tomcat 11.0.10</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.9">Fixed in Apache Tomcat
11.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.8">Fixed in Apache
Tomcat 11.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.7">Fixed in
Apache Tomcat 11.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.6">Fixed
in Apache Tomcat 11.0.6</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed in Apache Tomcat
11.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed in Apache
Tomcat 11.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed in
Apache Tomcat 11.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed
in Apache Tomcat 11.0.0</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache Tomca
t 11.0.0-M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in
Apache Tomcat 11.0.0-M17</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in Apache Tomcat
11.0.0-M12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in
Apache Tomcat 11.0.0-M11</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in Apache Tomcat
11.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in
Apache Tomcat 11.0.0-M5</a></li><li><a
href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in Apache Tomcat
11.0.0-M3</a></li></ul>
+ </div><h3 id="Fixed_in_Apache_Tomcat_11.0.12"><span
class="pull-right">2025-10-07</span> Fixed in Apache Tomcat 11.0.12</h3><div
class="text">
+
+ <p><strong>Low: Delayed cleaning of multipart upload temporary files may
+ lead to DoS</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61795"
rel="nofollow">CVE-2025-61795</a></p>
+
+ <p>If an error occurred (including exceeding limits) during the processing
+ of a multipart upload, temporary copies of the uploaded parts written to
+ disc were not cleaned up immediately but left for the garbage collection
+ process to delete. Depending on JVM settings, application memory usage
+ and application load, it was possible that space for the temporary
copies
+ of uploaded parts would be filled faster than GC cleared it, leading to
a
+ DoS.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/1cdf5f730ede75a0759492f179ac21ca4ff68e06">1cdf5f73</a>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.11</p>
+
+ </div><h3 id="Fixed_in_Apache_Tomcat_11.0.11"><span
class="pull-right">2025-09-05</span> Fixed in Apache Tomcat 11.0.11</h3><div
class="text">
+
+ <p><strong>Low: Console manipulation via escape sequences in log
+ messages</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55754"
rel="nofollow">CVE-2025-55754</a></p>
+
+ <p>Tomcat did not escape ANSI escape sequences in log messages. If Tomcat
+ was running in a console on a Windows operating system, and the console
+ supported ANSI escape sequences, it was possible for an attacker to use
a
+ specially crafted URL to inject ANSI escape sequences to manipulate the
+ console and the clip-board and attempt to trick an administrator into
+ running an attacker controlled command. While no attack vector was
found,
+ it may have been possible to mount this attack on other operating
+ systems.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/5a3db092982c0c58d4855304167ee757fe5e79bb">5a3db092</a>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.10</p>
+
+ <p><strong>Important: Directory traversal via Rewrite Valve with possible
+ remote code execution if PUT is enabled</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55752"
rel="nofollow">CVE-2025-55752</a></p>
+
+ <p>The fix for bug <a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=60013">60013</a>
introduced a regression where the
+ rewritten URL was normalized before it was decoded. This introduced the
+ possibility that, for rewrite rules that rewrite query parameters to the
+ URL, an attacker could manipulate the request URI to bypass security
+ constraints including the protection for <code>/WEB-INF/</code> and
+ <code>/META-INF/</code>. If PUT requests were also enabled then
malicious
+ files could be uploaded leading to remote code execution. PUT requests
+ are normally limited to trusted users and it is considered unlikely that
+ PUT requests would be enabled in conjunction with a rewrite that
+ manipulated the URI.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/fec06c610ed7466b401e29cc567a58aee5ed826a">fec06c61</a>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.10</p>
+
</div><h3 id="Fixed_in_Apache_Tomcat_11.0.10"><span
class="pull-right">2025-08-06</span> Fixed in Apache Tomcat 11.0.10</h3><div
class="text">
<p><strong>Important: DoS in HTTP/2 due to client triggered stream
Modified: tomcat/site/trunk/docs/security-9.html
==============================================================================
--- tomcat/site/trunk/docs/security-9.html Mon Oct 27 15:54:16 2025
(r1929378)
+++ tomcat/site/trunk/docs/security-9.html Mon Oct 27 17:12:06 2025
(r1929379)
@@ -36,7 +36,72 @@
</p>
</div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
- <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.108">Fixed in Apache Tomcat
9.0.108</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.107">Fixed in Apache
Tomcat 9.0.107</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.106">Fixed in
Apache Tomcat 9.0.106</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.105">Fixed in Apache Tomcat
9.0.105</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.104">Fixed in Apache
Tomcat 9.0.104</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.99">Fixed in
Apache Tomcat 9.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed
in Apache Tomcat 9.0.98</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed in Apache Tomcat
9.0.97</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in Apache
Tomcat 9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed in
Apache Tomcat 9.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed
in Apache Tomcat 9.0.86</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in Apache Tomca
t 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in Apache
Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in
Apache Tomcat 9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed
in Apache Tomcat 9.0.75</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache Tomcat
9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in Apache
Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in
Apache Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed
in Apache Tomcat 9.0.69</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache Tomcat
9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache
Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in
Apache Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed
in Apache Tomcat 9.0.62</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache Tomcat
9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache
Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in
Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed
in Apache Tomcat 9.0.46</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat
9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache
Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in
Apache Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed
in Apache Tomcat 9.0.40</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache Tomcat
9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache
Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in
Apache Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed
in Apache Tomcat 9.0.35</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat
9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache
Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in
Apache Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed
in Apache Tomcat 9.0.21</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat
9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache
Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in
Apache Tomcat 9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed
in Apache Tomcat 9.0.12</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache Tomcat
9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache
Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in
Apache Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed
in Apache Tomcat 9.0.5</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache Tomcat 9.0.2</a
></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache Tomcat
>9.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache
>Tomcat 9.0.0.M22</a></li><li><a
>href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat
>9.0.0.M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in
>Apache Tomcat 9.0.0.M19</a></li><li><a
>href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache Tomcat
>9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in
>Apache Tomcat 9.0.0.M17</a></li><li><a
>href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat
>9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in
>Apache Tomcat 9.0.0.M13</a></li><li><a
>href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat
>9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in
>Apache Tomcat 9.0.0.M8</a></li><li><a
>href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat
>9.0.0.M3</a></li><li><a href="#Not_a_vuln
erability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul>
+ <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.110">Fixed in Apache Tomcat
9.0.110</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.1.109">Fixed in Apache
Tomcat 9.1.109</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.108">Fixed in
Apache Tomcat 9.0.108</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.107">Fixed in Apache Tomcat
9.0.107</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.106">Fixed in Apache
Tomcat 9.0.106</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.105">Fixed in
Apache Tomcat 9.0.105</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.104">Fixed in Apache Tomcat
9.0.104</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.99">Fixed in Apache
Tomcat 9.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in
Apache Tomcat 9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed
in Apache Tomcat 9.0.97</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in Apache Tomcat
9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed in Apache T
omcat 9.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in
Apache Tomcat 9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed
in Apache Tomcat 9.0.83</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in Apache Tomcat
9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in Apache
Tomcat 9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in
Apache Tomcat 9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed
in Apache Tomcat 9.0.74</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in Apache Tomcat
9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in Apache
Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in
Apache Tomcat 9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed
in Apache Tomcat 9.0.68</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache Tomcat
9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache To
mcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in
Apache Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed
in Apache Tomcat 9.0.58</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache Tomcat
9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache
Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in
Apache Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed
in Apache Tomcat 9.0.45</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache Tomcat
9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache
Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in
Apache Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed
in Apache Tomcat 9.0.38</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache Tomcat
9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache Tom
cat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in
Apache Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed
in Apache Tomcat 9.0.31</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat
9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache
Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in
Apache Tomcat 9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed
in Apache Tomcat 9.0.20</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache Tomcat
9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache
Tomcat 9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in
Apache Tomcat 9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed
in Apache Tomcat 9.0.10</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache Tomcat
9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in Apache
Tomcat
9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache
Tomcat 9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in
Apache Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed
in Apache Tomcat 9.0.1</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat
9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in
Apache Tomcat 9.0.0.M21</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat
9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in
Apache Tomcat 9.0.0.M18</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat
9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in
Apache Tomcat 9.0.0.M15</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat
9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in
Apache Tomcat 9.0.0.M10</a></li><li><a href="#Fixed_in_Apach
e_Tomcat_9.0.0.M8">Fixed in Apache Tomcat 9.0.0.M8</a></li><li><a
href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat
9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a
vulnerability in Tomcat</a></li></ul>
+ </div><h3 id="Fixed_in_Apache_Tomcat_9.0.110"><span
class="pull-right">2025-10-06</span> Fixed in Apache Tomcat 9.0.110</h3><div
class="text">
+
+ <p><strong>Low: Delayed cleaning of multipart upload temporary files may
+ lead to DoS</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61795"
rel="nofollow">CVE-2025-61795</a></p>
+
+ <p>If an error occurred (including exceeding limits) during the processing
+ of a multipart upload, temporary copies of the uploaded parts written to
+ disc were not cleaned up immediately but left for the garbage collection
+ process to delete. Depending on JVM settings, application memory usage
+ and application load, it was possible that space for the temporary
copies
+ of uploaded parts would be filled faster than GC cleared it, leading to
a
+ DoS.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/afa422bd7ca1eef0f507259c682fd876494d9c3b">afa422bd</a>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 9.0.0.M1 to 9.0.109</p>
+
+ </div><h3 id="Fixed_in_Apache_Tomcat_9.1.109"><span
class="pull-right">2025-09-05</span> Fixed in Apache Tomcat 9.1.109</h3><div
class="text">
+
+ <p><strong>Low: Console manipulation via escape sequences in log
+ messages</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55754"
rel="nofollow">CVE-2025-55754</a></p>
+
+ <p>Tomcat did not escape ANSI escape sequences in log messages. If Tomcat
+ was running in a console on a Windows operating system, and the console
+ supported ANSI escape sequences, it was possible for an attacker to use
a
+ specially crafted URL to inject ANSI escape sequences to manipulate the
+ console and the clip-board and attempt to trick an administrator into
+ running an attacker controlled command. While no attack vector was
found,
+ it may have been possible to mount this attack on other operating
+ systems.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/a03cabf3a36a42d27d8d997ed31f034f50ba6cd5">a03cabf3</a>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 9.0.40 to 9.0.108</p>
+
+ <p><strong>Important: Directory traversal via Rewrite Valve with possible
+ remote code execution if PUT is enabled</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55752"
rel="nofollow">CVE-2025-55752</a></p>
+
+ <p>The fix for bug <a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=60013">60013</a>
introduced a regression where the
+ rewritten URL was normalized before it was decoded. This introduced the
+ possibility that, for rewrite rules that rewrite query parameters to the
+ URL, an attacker could manipulate the request URI to bypass security
+ constraints including the protection for <code>/WEB-INF/</code> and
+ <code>/META-INF/</code>. If PUT requests were also enabled then
malicious
+ files could be uploaded leading to remote code execution. PUT requests
+ are normally limited to trusted users and it is considered unlikely that
+ PUT requests would be enabled in conjunction with a rewrite that
+ manipulated the URI.</p>
+
+ <p>This was fixed with commit
+ <a
href="https://github.com/apache/tomcat/commit/b5042622b8b78340ae65403c55dcb9c7416924df">b5042622</a>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 9.0.0.M11 to 9.0.108</p>
+
</div><h3 id="Fixed_in_Apache_Tomcat_9.0.108"><span
class="pull-right">2025-08-06</span> Fixed in Apache Tomcat 9.0.108</h3><div
class="text">
<p><strong>Important: DoS in HTTP/2 due to client triggered stream
Modified: tomcat/site/trunk/xdocs/security-10.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-10.xml Mon Oct 27 15:54:16 2025
(r1929378)
+++ tomcat/site/trunk/xdocs/security-10.xml Mon Oct 27 17:12:06 2025
(r1929379)
@@ -56,6 +56,75 @@
<toc/>
</section>
+ <section name="Fixed in Apache Tomcat 10.1.47" rtext="2025-10-07">
+
+ <p><strong>Low: Delayed cleaning of multipart upload temporary files may
+ lead to DoS</strong>
+ <cve>CVE-2025-61795</cve></p>
+
+ <p>If an error occurred (including exceeding limits) during the processing
+ of a multipart upload, temporary copies of the uploaded parts written to
+ local storage were not cleaned up immediately but left for the garbage
+ collection process to delete. Depending on JVM settings, application
+ memory usage and application load, it was possible that space for the
+ temporary copies of uploaded parts would be filled faster than GC
cleared
+ it, leading to a DoS.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="af6e9181620304c0d818121c29c074e1330610d0"/>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.46</p>
+
+ </section>
+
+ <section name="Fixed in Apache Tomcat 10.1.45" rtext="2025-09-08">
+
+ <p><strong>Low: Console manipulation via escape sequences in log
+ messages</strong>
+ <cve>CVE-2025-55754</cve></p>
+
+ <p>Tomcat did not escape ANSI escape sequences in log messages. If Tomcat
+ was running in a console on a Windows operating system, and the console
+ supported ANSI escape sequences, it was possible for an attacker to use
a
+ specially crafted URL to inject ANSI escape sequences to manipulate the
+ console and the clipboard and attempt to trick an administrator into
+ running an attacker controlled command. While no attack vector was
found,
+ it may have been possible to mount this attack on other operating
+ systems.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="138d7f5cfaae683078948303333c080e6faa75d2"/>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.44</p>
+
+ <p><strong>Important: Directory traversal via Rewrite Valve with possible
+ remote code execution if PUT is enabled</strong>
+ <cve>CVE-2025-55752</cve></p>
+
+ <p>The fix for bug <bug>60013</bug> introduced a regression where the
+ rewritten URL was normalized before it was decoded. This introduced the
+ possibility that, for rewrite rules that rewrite query parameters to the
+ URL, an attacker could manipulate the request URI to bypass security
+ constraints including the protection for <code>/WEB-INF/</code> and
+ <code>/META-INF/</code>. If PUT requests were also enabled then
malicious
+ files could be uploaded leading to remote code execution. PUT requests
+ are normally limited to trusted users and it is considered unlikely that
+ PUT requests would be enabled in conjunction with a rewrite that
+ manipulated the URI.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="130d36d8492ef9e4eb22952c17c92423cb35fd06"/>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 10.1.0-M1 to 10.1.44</p>
+
+ </section>
+
<section name="Fixed in Apache Tomcat 10.1.44" rtext="2025-08-07">
<p><strong>Important: DoS in HTTP/2 due to client triggered stream
Modified: tomcat/site/trunk/xdocs/security-11.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-11.xml Mon Oct 27 15:54:16 2025
(r1929378)
+++ tomcat/site/trunk/xdocs/security-11.xml Mon Oct 27 17:12:06 2025
(r1929379)
@@ -50,6 +50,75 @@
<toc/>
</section>
+ <section name="Fixed in Apache Tomcat 11.0.12" rtext="2025-10-07">
+
+ <p><strong>Low: Delayed cleaning of multipart upload temporary files may
+ lead to DoS</strong>
+ <cve>CVE-2025-61795</cve></p>
+
+ <p>If an error occurred (including exceeding limits) during the processing
+ of a multipart upload, temporary copies of the uploaded parts written to
+ local storage were not cleaned up immediately but left for the garbage
+ collection process to delete. Depending on JVM settings, application
+ memory usage and application load, it was possible that space for the
+ temporary copies of uploaded parts would be filled faster than GC
cleared
+ it, leading to a DoS.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="1cdf5f730ede75a0759492f179ac21ca4ff68e06"/>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.11</p>
+
+ </section>
+
+ <section name="Fixed in Apache Tomcat 11.0.11" rtext="2025-09-05">
+
+ <p><strong>Low: Console manipulation via escape sequences in log
+ messages</strong>
+ <cve>CVE-2025-55754</cve></p>
+
+ <p>Tomcat did not escape ANSI escape sequences in log messages. If Tomcat
+ was running in a console on a Windows operating system, and the console
+ supported ANSI escape sequences, it was possible for an attacker to use
a
+ specially crafted URL to inject ANSI escape sequences to manipulate the
+ console and the clipboard and attempt to trick an administrator into
+ running an attacker controlled command. While no attack vector was
found,
+ it may have been possible to mount this attack on other operating
+ systems.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="5a3db092982c0c58d4855304167ee757fe5e79bb"/>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.10</p>
+
+ <p><strong>Important: Directory traversal via Rewrite Valve with possible
+ remote code execution if PUT is enabled</strong>
+ <cve>CVE-2025-55752</cve></p>
+
+ <p>The fix for bug <bug>60013</bug> introduced a regression where the
+ rewritten URL was normalized before it was decoded. This introduced the
+ possibility that, for rewrite rules that rewrite query parameters to the
+ URL, an attacker could manipulate the request URI to bypass security
+ constraints including the protection for <code>/WEB-INF/</code> and
+ <code>/META-INF/</code>. If PUT requests were also enabled then
malicious
+ files could be uploaded leading to remote code execution. PUT requests
+ are normally limited to trusted users and it is considered unlikely that
+ PUT requests would be enabled in conjunction with a rewrite that
+ manipulated the URI.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="fec06c610ed7466b401e29cc567a58aee5ed826a"/>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 11.0.0-M1 to 11.0.10</p>
+
+ </section>
+
<section name="Fixed in Apache Tomcat 11.0.10" rtext="2025-08-06">
<p><strong>Important: DoS in HTTP/2 due to client triggered stream
Modified: tomcat/site/trunk/xdocs/security-9.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml Mon Oct 27 15:54:16 2025
(r1929378)
+++ tomcat/site/trunk/xdocs/security-9.xml Mon Oct 27 17:12:06 2025
(r1929379)
@@ -50,6 +50,75 @@
<toc/>
</section>
+ <section name="Fixed in Apache Tomcat 9.0.110" rtext="2025-10-06">
+
+ <p><strong>Low: Delayed cleaning of multipart upload temporary files may
+ lead to DoS</strong>
+ <cve>CVE-2025-61795</cve></p>
+
+ <p>If an error occurred (including exceeding limits) during the processing
+ of a multipart upload, temporary copies of the uploaded parts written to
+ local storage were not cleaned up immediately but left for the garbage
+ collection process to delete. Depending on JVM settings, application
+ memory usage and application load, it was possible that space for the
+ temporary copies of uploaded parts would be filled faster than GC
cleared
+ it, leading to a DoS.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="afa422bd7ca1eef0f507259c682fd876494d9c3b"/>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 9.0.0.M1 to 9.0.109</p>
+
+ </section>
+
+ <section name="Fixed in Apache Tomcat 9.1.109" rtext="2025-09-05">
+
+ <p><strong>Low: Console manipulation via escape sequences in log
+ messages</strong>
+ <cve>CVE-2025-55754</cve></p>
+
+ <p>Tomcat did not escape ANSI escape sequences in log messages. If Tomcat
+ was running in a console on a Windows operating system, and the console
+ supported ANSI escape sequences, it was possible for an attacker to use
a
+ specially crafted URL to inject ANSI escape sequences to manipulate the
+ console and the clipboard and attempt to trick an administrator into
+ running an attacker controlled command. While no attack vector was
found,
+ it may have been possible to mount this attack on other operating
+ systems.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="a03cabf3a36a42d27d8d997ed31f034f50ba6cd5"/>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 9.0.40 to 9.0.108</p>
+
+ <p><strong>Important: Directory traversal via Rewrite Valve with possible
+ remote code execution if PUT is enabled</strong>
+ <cve>CVE-2025-55752</cve></p>
+
+ <p>The fix for bug <bug>60013</bug> introduced a regression where the
+ rewritten URL was normalized before it was decoded. This introduced the
+ possibility that, for rewrite rules that rewrite query parameters to the
+ URL, an attacker could manipulate the request URI to bypass security
+ constraints including the protection for <code>/WEB-INF/</code> and
+ <code>/META-INF/</code>. If PUT requests were also enabled then
malicious
+ files could be uploaded leading to remote code execution. PUT requests
+ are normally limited to trusted users and it is considered unlikely that
+ PUT requests would be enabled in conjunction with a rewrite that
+ manipulated the URI.</p>
+
+ <p>This was fixed with commit
+ <hashlink hash="b5042622b8b78340ae65403c55dcb9c7416924df"/>.</p>
+
+ <p>The issue was made public on 27 October 2025.</p>
+
+ <p>Affects: 9.0.0.M11 to 9.0.108</p>
+
+ </section>
+
<section name="Fixed in Apache Tomcat 9.0.108" rtext="2025-08-06">
<p><strong>Important: DoS in HTTP/2 due to client triggered stream
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]