Metrics
Affected Vendors & Products
Wed, 09 Apr 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:rhel_eus:8.8 |
Tue, 08 Apr 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat enterprise Linux
Redhat rhel Eus |
|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:jboss_enterprise_web_server:6.1 cpe:/a:redhat:jboss_enterprise_web_server:6.1::el8 cpe:/a:redhat:jboss_enterprise_web_server:6.1::el9 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.4 |
|
Vendors & Products |
Redhat enterprise Linux
Redhat rhel Eus |
Thu, 03 Apr 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Debian
Debian debian Linux |
|
CPEs | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | |
Vendors & Products |
Debian
Debian debian Linux |
Thu, 03 Apr 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat jboss Enterprise Web Server |
|
CPEs | cpe:/a:redhat:jboss_enterprise_web_server:5.8 cpe:/a:redhat:jboss_enterprise_web_server:5.8::el7 cpe:/a:redhat:jboss_enterprise_web_server:5.8::el8 cpe:/a:redhat:jboss_enterprise_web_server:5.8::el9 |
|
Vendors & Products |
Redhat
Redhat jboss Enterprise Web Server |
Wed, 02 Apr 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 02 Apr 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 01 Apr 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Tue, 01 Apr 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
ssvc
|
Fri, 21 Mar 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 19 Mar 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 18 Mar 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache tomcat |
|
Weaknesses | CWE-706 | |
CPEs | cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone10:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone11:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone12:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone13:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone14:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone15:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone16:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone17:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone18:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone19:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone1:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone20:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone2:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone3:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone4:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone5:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone6:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone7:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone8:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone9:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone12:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone13:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone14:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone15:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone16:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone17:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone18:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone19:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone20:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone21:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone22:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone23:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone24:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone25:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:* |
|
Vendors & Products |
Apache
Apache tomcat |
Tue, 18 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.98, which fixes the issue. | Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue. |
Tue, 18 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 17 Mar 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-444 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 17 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
ssvc
|
Thu, 13 Mar 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
threat_severity
|
threat_severity
|
Wed, 12 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-444 | |
Metrics |
cvssV3_1
|
ssvc
|
Wed, 12 Mar 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 10 Mar 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 10 Mar 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.98, which fixes the issue. | |
Title | Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT | |
Weaknesses | CWE-44 CWE-502 |
|
References |
|

Status: PUBLISHED
Assigner: apache
Published: 2025-03-10T16:44:03.715Z
Updated: 2025-04-02T22:03:17.999Z
Reserved: 2025-01-24T08:51:50.296Z
Link: CVE-2025-24813

Updated: 2025-04-02T22:03:17.999Z

Status : Analyzed
Published: 2025-03-10T17:15:35.067
Modified: 2025-04-03T20:59:51.680
Link: CVE-2025-24813
