{"id":467,"date":"2025-03-19T16:30:21","date_gmt":"2025-03-19T16:30:21","guid":{"rendered":"https:\/\/www.techrepublic.com\/?p=4298508"},"modified":"2025-03-19T16:30:21","modified_gmt":"2025-03-19T16:30:21","slug":"stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk","status":"publish","type":"post","link":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/","title":{"rendered":"Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk?"},"content":{"rendered":"<figure id=\"attachment_4298509\" aria-describedby=\"caption-attachment-4298509\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4298509\" src=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-apache-tomcat-vulnerability.jpg\" alt=\"Kurilian Bobtail in nature.\" width=\"1400\" height=\"900\" srcset=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-apache-tomcat-vulnerability.jpg 1400w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-apache-tomcat-vulnerability-300x193.jpg 300w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-apache-tomcat-vulnerability-1024x658.jpg 1024w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-apache-tomcat-vulnerability-768x494.jpg 768w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-apache-tomcat-vulnerability-50x32.jpg 50w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-apache-tomcat-vulnerability-770x495.jpg 770w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-apache-tomcat-vulnerability-370x238.jpg 370w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-apache-tomcat-vulnerability-270x174.jpg 270w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-apache-tomcat-vulnerability-740x476.jpg 740w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-apache-tomcat-vulnerability-540x347.jpg 540w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-apache-tomcat-vulnerability-1110x714.jpg 1110w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-apache-tomcat-vulnerability-810x521.jpg 810w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\"><figcaption id=\"caption-attachment-4298509\" class=\"wp-caption-text\">Image: cynoclub\/Envato Elements<\/figcaption><\/figure>\n<p>Apache Tomcat is under attack as cybercriminals actively exploit a recently disclosed vulnerability, enabling remote code execution (RCE). With simple HTTP requests, attackers can trigger the deserialisation of malicious data and gain control over affected systems.<\/p>\n<p>The vulnerability, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24813\" target=\"_blank\" rel=\"noopener\">CVE-2025-24813<\/a>, was disclosed by Apache on March 10, with the <a href=\"https:\/\/github.com\/iSee857\/CVE-2025-24813-PoC\/blob\/main\/Tomcat_CVE-2025-24813_RCE.py\" target=\"_blank\" rel=\"noopener\">first proof of concept<\/a> being released on GitHub about 30 hours later, posted by user iSee857. Soon after, security firm Wallarm later saw that this was being leveraged in the wild, warning that the attacks are undetectable to traditional security filters as HTTP requests appear normal and malicious payloads are base64-encoded.<\/p>\n<p>First, an attacker sends a PUT request containing an encoded, serialised Java payload, which is then written inside Tomcat\u2019s session storage and automatically saved in a file. Then they send a GET request with a JSESSIONID cookie pointing to the malicious session.<\/p>\n<p>When Tomcat processes this request, it deserialises the session data without proper validation, executing the embedded malicious Java code and giving the attacker full remote access.<\/p>\n<p><strong>SEE: <a href=\"https:\/\/www.techrepublic.com\/article\/how-to-use-the-apache-web-server-to-install-and-configure-a-website\/\">How to Use the Apache Web Server to Install and Configure a Website<\/a><\/strong><\/p>\n<aside class=\"pinbox right\">\n<h3 class=\"heading\">Must-read security coverage<\/h3>\n<\/aside>\n<h2><span class=\"ez-toc-section\" id=\"Which_Apache_Tomcat_versions_are_vulnerable\"><\/span>Which Apache Tomcat versions are vulnerable?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>No authentication is required for this to work but, according to Apache\u2019s <a href=\"https:\/\/lists.apache.org\/thread\/j5fkjv2k477os90nczf2v9l61fb0kkgq\" target=\"_blank\" rel=\"noopener\">security note<\/a>, the following must be true for a Tomcat application to be vulnerable:<\/p>\n<ul>\n<li>Writes are enabled for the default servlet<\/li>\n<li>Partial PUT request support is enabled<\/li>\n<li>Tomcat includes a library that could be leveraged in deserialisation attacks<\/li>\n<li>The default storage location uses file-based session persistence<\/li>\n<\/ul>\n<p>As well as remote code execution exploits, the vulnerability can allow attackers to view or amend security-sensitive files if the following conditions are met:<\/p>\n<ul>\n<li>Writes are enabled for the default servlet<\/li>\n<li>Partial PUT request support is enabled<\/li>\n<li>The security-sensitive files are stored in a publicly available directory and were uploaded by partial PUT<\/li>\n<li>The attacker knows the filenames<\/li>\n<\/ul>\n<p>With these conditions fulfilled, the following Tomcat versions are all vulnerable:<\/p>\n<ul>\n<li>Apache Tomcat 11.0.0-M1 to 11.0.2<\/li>\n<li>Apache Tomcat 10.1.0-M1 to 10.1.34<\/li>\n<li>Apache Tomcat 9.0.0.M1 to 9.0.98<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Mitigation_How_to_protect_your_system\"><\/span>Mitigation: How to protect your system<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>To mitigate the vulnerability, Apache recommends users upgrade to Tomcat versions 11.0.3 or later, 10.1.35 or later, or 9.0.99 or later, respectively, as these are all sufficiently patched. Alternatively, users can turn off partial PUT support, disable writes for the default servlet, and avoid storing security-sensitive files in directories that are publicly accessible.<\/p>\n<p>Wallarm researchers warn that this vulnerability highlights the possibility of other security flaws emerging due to Tomcat\u2019s handling of partial PUT requests \u201cwhich allows uploading practically any file anywhere\u201d.<\/p>\n<p>\u201cAttackers will soon start shifting their tactics, uploading malicious JSP files, modifying configurations, and planting backdoors outside session storage,\u201d they wrote in a <a href=\"https:\/\/lab.wallarm.com\/one-put-request-to-own-tomcat-cve-2025-24813-rce-is-in-the-wild\/\" target=\"_blank\" rel=\"noopener\">blog post<\/a>. \u201cThis is just the first wave.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Image: cynoclub\/Envato Elements Apache Tomcat is under attack as cybercriminals actively exploit a recently disclosed vulnerability, enabling remote code execution (RCE). With simple HTTP requests, attackers can trigger the deserialisation of malicious data and gain control over affected systems. The vulnerability, CVE-2025-24813, was disclosed by Apache on March 10, with the first proof of concept [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":468,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-467","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk? - TecnoArtesanos Tech Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk? - TecnoArtesanos Tech Blog\" \/>\n<meta property=\"og:description\" content=\"Image: cynoclub\/Envato Elements Apache Tomcat is under attack as cybercriminals actively exploit a recently disclosed vulnerability, enabling remote code execution (RCE). With simple HTTP requests, attackers can trigger the deserialisation of malicious data and gain control over affected systems. The vulnerability, CVE-2025-24813, was disclosed by Apache on March 10, with the first proof of concept [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoArtesanos Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-19T16:30:21+00:00\" \/>\n<meta name=\"author\" content=\"Sergio Morales\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sergio Morales\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/\",\"name\":\"Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk? - TecnoArtesanos Tech Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk.jpg\",\"datePublished\":\"2025-03-19T16:30:21+00:00\",\"author\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/#primaryimage\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk.jpg\",\"contentUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk.jpg\",\"width\":1400,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.tecnoartesanos.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/\",\"name\":\"TecnoArtesanos Tech Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\",\"name\":\"Sergio Morales\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"caption\":\"Sergio Morales\"},\"sameAs\":[\"https:\/\/sergiomorales.space\"],\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk? - TecnoArtesanos Tech Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/","og_locale":"en_US","og_type":"article","og_title":"Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk? - TecnoArtesanos Tech Blog","og_description":"Image: cynoclub\/Envato Elements Apache Tomcat is under attack as cybercriminals actively exploit a recently disclosed vulnerability, enabling remote code execution (RCE). With simple HTTP requests, attackers can trigger the deserialisation of malicious data and gain control over affected systems. The vulnerability, CVE-2025-24813, was disclosed by Apache on March 10, with the first proof of concept [&hellip;]","og_url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/","og_site_name":"TecnoArtesanos Tech Blog","article_published_time":"2025-03-19T16:30:21+00:00","author":"Sergio Morales","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sergio Morales","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/","url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/","name":"Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk? - TecnoArtesanos Tech Blog","isPartOf":{"@id":"https:\/\/blog.tecnoartesanos.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/#primaryimage"},"image":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk.jpg","datePublished":"2025-03-19T16:30:21+00:00","author":{"@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807"},"breadcrumb":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/#primaryimage","url":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk.jpg","contentUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk.jpg","width":1400,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.tecnoartesanos.com\/"},{"@type":"ListItem","position":2,"name":"Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk?"}]},{"@type":"WebSite","@id":"https:\/\/blog.tecnoartesanos.com\/#website","url":"https:\/\/blog.tecnoartesanos.com\/","name":"TecnoArtesanos Tech Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807","name":"Sergio Morales","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","caption":"Sergio Morales"},"sameAs":["https:\/\/sergiomorales.space"],"url":"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/comments?post=467"}],"version-history":[{"count":0,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/467\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media\/468"}],"wp:attachment":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media?parent=467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/categories?post=467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/tags?post=467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}