Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:0954-1

Опубликовано: 19 мар. 2025
Источник: suse-cvrf

Описание

Security update for tomcat

This update for tomcat fixes the following issues:

  • CVE-2025-24813: Fixed potential RCE and/or information disclosure/corruption with partial PUT (bsc#1239302)

Список пакетов

SUSE Linux Enterprise Server 12 SP5-LTSS
tomcat-9.0.36-3.139.1
tomcat-admin-webapps-9.0.36-3.139.1
tomcat-docs-webapp-9.0.36-3.139.1
tomcat-el-3_0-api-9.0.36-3.139.1
tomcat-javadoc-9.0.36-3.139.1
tomcat-jsp-2_3-api-9.0.36-3.139.1
tomcat-lib-9.0.36-3.139.1
tomcat-servlet-4_0-api-9.0.36-3.139.1
tomcat-webapps-9.0.36-3.139.1
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5
tomcat-9.0.36-3.139.1
tomcat-admin-webapps-9.0.36-3.139.1
tomcat-docs-webapp-9.0.36-3.139.1
tomcat-el-3_0-api-9.0.36-3.139.1
tomcat-javadoc-9.0.36-3.139.1
tomcat-jsp-2_3-api-9.0.36-3.139.1
tomcat-lib-9.0.36-3.139.1
tomcat-servlet-4_0-api-9.0.36-3.139.1
tomcat-webapps-9.0.36-3.139.1

Описание

Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-9.0.36-3.139.1
SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-admin-webapps-9.0.36-3.139.1
SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-docs-webapp-9.0.36-3.139.1
SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-el-3_0-api-9.0.36-3.139.1

Ссылки