Jed Security’s Post

𝗪𝗲𝗲𝗸𝗹𝘆 #𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆𝗔𝗹𝗲𝗿𝘁: [CRITICAL] CVE-2025-24813 - #Apache Tomcat Default Servlet Path Equivalence RCE & Info Disclosure • 𝗪𝗵𝗮𝘁 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝘄𝗮𝘀 𝗗𝗶𝘀𝗰𝗼𝘃𝗲𝗿𝗲𝗱? A #vulnerability in Apache Tomcat’s Default Servlet allows attackers to exploit path equivalence via the internal dot in file.Name. • 𝗜𝘀 𝗶𝘁 𝗘𝘅𝗽𝗹𝗼𝗶𝘁𝗮𝗯𝗹𝗲? Yes! Exploitation may allow a remote attacker to access and overwrite sensitive files. Remote code execution is also possible. • 𝗦𝗵𝗼𝘂𝗹𝗱 𝗜 𝗜𝗴𝗻𝗼𝗿𝗲 𝗶𝘁? No! It is highly recommended to upgrade to Apache Tomcat versions 11.0.3, 10.1.35, or 9.0.99. 𝗟𝗲𝗮𝗿𝗻 𝗺𝗼𝗿𝗲, 𝗶𝗻𝗰𝗹𝘂𝗱𝗶𝗻𝗴:  • When the vulnerability presents  • Configurations where remote code execution is possible  • Immediate risk reduction tactics  https://lnkd.in/eykNxAFv

  • No alternative text description for this image

To view or add a comment, sign in

Explore topics