Friday, April 4, 2025
HomeApacheApache Tomcat Vulnerability Exploited to Execute Malicious Arbitrary Code on Servers

Apache Tomcat Vulnerability Exploited to Execute Malicious Arbitrary Code on Servers

Published on

SIEM as a Service

Follow Us on Google News

A critical remote code execution (RCE) vulnerability, tracked as CVE-2025-24813, is being actively exploited in Apache Tomcat servers.

Critical RCE Flaw in Apache Tomcat

The flaw allows attackers to upload malicious files via unauthenticated HTTP PUT requests, followed by a GET request to trigger deserialization, leading to arbitrary code execution.

Affected versions include Tomcat 9.0.0-M1 to 9.0.98, 10.1.0-M1 to 10.1.34, and 11.0.0-M1 to 11.0.2.

Apache Tomcat
Vulnerability Intelligence Card for CVE-2025-24813 i

Patched versions (9.0.99, 10.1.35, and 11.0.3) were released, but exploitation began within 30 hours of disclosure, with proof-of-concept (PoC) exploits circulating publicly.

Exploitation and Attack Patterns

Attackers leverage partial PUT requests to upload serialized payloads to writable directories, often targeting file-based session persistence.

Successful exploitation requires non-default configurations, such as enabled default servlet write permissions and deserialization-vulnerable libraries.

GreyNoise observed attacks originating from Latvia, Italy, the U.S., and China, with 70% targeting U.S. systems.

According to the Report, payloads are often obfuscated with Base64 to evade detection.

Organizations should upgrade to patched versions or disable partial PUT support and restrict write permissions.

Monitoring for unexpected JSP files or PUT/GET requests in logs is advised.

Security firms like Akamai and Cloudflare note that exploitation requires specific server configurations, limiting widespread impact.

However, the ease of exploitation and Tomcat’s widespread use make this a high-priority threat.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ex-ASML Russian Employee Smuggled Trade Secrets to Moscow via USB

A former employee of Dutch semiconductor firm ASML, identified as German A. (43), stands...

Critical Apache Parquet Vulnerability Allows Remote Code Execution

A severe vulnerability has been identified in the Apache Parquet Java library, specifically within...

Halo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code

A critical security flaw has been discovered in Halo ITSM, an IT support management software...

Australian Pension Funds Hacked: Members Face Financial Losses

Several of Australia’s largest superannuation funds have been targeted in a coordinated cyberattack, leading...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ex-ASML Russian Employee Smuggled Trade Secrets to Moscow via USB

A former employee of Dutch semiconductor firm ASML, identified as German A. (43), stands...

Critical Apache Parquet Vulnerability Allows Remote Code Execution

A severe vulnerability has been identified in the Apache Parquet Java library, specifically within...

Halo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code

A critical security flaw has been discovered in Halo ITSM, an IT support management software...