Source: tomcat11
Version: 11.0.6-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: clone -1 -2
Control: reassign -2 src:tomcat10 10.1.40-1
Control: retitle -2 tomcat10: CVE-2025-49125




*** /tmp/tomcat11.reportbug
Package: tomcat11
X-Debbugs-CC: [email protected]
Severity: grave
Tags: security

Hi,

The following vulnerability was published for tomcat.

CVE-2025-49125[0]:
| Authentication Bypass Using an Alternate Path or Channel
| vulnerability in Apache Tomcat.  When using PreResources or
| PostResources mounted other than at the root of the web application,
| it was possible to access those resources via an unexpected path.
| That path was likely not to be protected by the same security
| constraints as the expected path, allowing those security
| constraints to be bypassed.  This issue affects Apache Tomcat: from
| 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from
| 9.0.0.M1 through 9.0.105.  Users are recommended to upgrade to
| version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-49125
    https://www.cve.org/CVERecord?id=CVE-2025-49125

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
__
This is the maintainer address of Debian's Java team
<https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-java-maintainers>.
 Please use
[email protected] for discussions and questions.

Reply via email to