Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

NYC’s Robin Hood Charity Condemns Newly-Passed Senate Bill. Its Billionaire Donors Are Staying Mum

July 3, 2025

Denny’s and Waffle House remove egg surcharges as prices fall

July 3, 2025

One Tech Tip: Get the most out of ChatGPT and other AI chatbots with better prompts

July 3, 2025
Facebook X (Twitter) Instagram
Trending
  • NYC’s Robin Hood Charity Condemns Newly-Passed Senate Bill. Its Billionaire Donors Are Staying Mum
  • Denny’s and Waffle House remove egg surcharges as prices fall
  • One Tech Tip: Get the most out of ChatGPT and other AI chatbots with better prompts
  • Women buck trend, look to grow rodeo sport of ranch bronc riding
  • Dubai’s restaurant scene is booming but is testing its limits
  • Gearing up for a July Fourth party may cost less this year despite US tariffs
  • O’odham family blends Catholic and Native American beliefs in worship
  • Saguaro fruit connects Tohono O’odham Nation with ancestors
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Friday, July 4
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum
Cybersecurity

Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum

adminBy adminMarch 17, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 53


Less than a week after the rollout of patchesfor a critical remote code execution vulnerability in Apache Tomcat, exploit code has been published on a Chinese forum showing how to hijack servers with a single PUT request.

According to a bulletin from Wallarm, there are signs the bug is being exploited in the wild prior to the release of exploit code.

The Apache Tomcat vulnerability, tagged as CVE-2025-24813 and patched last Monday with an important-severity rating, affects Apache Tomcat 11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, and 9.0.0.M1 to 9.0.98.

“This attack is dead simple to execute and requires no authentication. The only requirement is that Tomcat is using file-based session storage, which is common in many deployments,” Wallarm said in a note warning about in-the-wild exploitation.

“Worse, base64 encoding allows the exploit to bypass most traditional security filters, making detection challenging,” the company added. 

In the attacks observed, Wallarm said a PUT request was sent containing a base64-encoded serialized Java payload saved to Tomcat’s session storage.

The attacker then sends a GET request with a JSESSIONID cookie pointing to the uploaded session file, forcing Tomcat to deserialize and execute the malicious Java code, granting complete control to the attacker.

The attack does not require authentication and is caused by Tomcat accepting partial PUT requests and its default session persistence, Wallarm explained.

Advertisement. Scroll to continue reading.

Last Monday, the Apache Foundation published a security advisory warning users that, under certain conditions, an attacker could view or inject arbitrary content on security-sensitive files.

The conditions were the following:

Writes enabled for the default servlet (readonly= “false”) — (Disabled by default)

Support for partial PUT is enabled (Enabled by default.)

Security-sensitive uploads occur in a sub-directory of a public upload directory.

The attacker knows the names of security-sensitive files being uploaded.

These security-sensitive files are being uploaded using partial PUT.

Apache recommended that all users upgrade to Tomcat versions 11.0.3+, 10.1.35+, or 9.0.99+ to mitigate this threat.

Tomcat users can also revert to the default servlet configuration (readonly= “true”), turning off partial PUT support, and avoiding storing security-sensitive files in a subdirectory of public upload paths.

Wallarm warns that the bigger issue highlighted in this case isn’t the exploitation activity itself but the potential for more RCE vulnerabilities arising from the partial PUT handling in Tomcat.

“Attackers will soon start shifting their tactics, uploading malicious JSP files, modifying configurations, and planting backdoors outside session storage. This is just the first wave,” Wallarm declared. 

Related: Apache Foundation Calls Out Open-Source Leechers

Related: Exploits Swirling for Major Security Defect in Apache Log4j

Related: Exploitation of Recent Critical Apache Struts 2 Flaw Begins

Related: Apache Makes Another Attempt at Patching Exploited RCE in OFBiz

Related: Second Apache OFBiz Vulnerability Exploited in Attacks



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

NYC’s Robin Hood Charity Condemns Newly-Passed Senate Bill. Its Billionaire Donors Are Staying Mum

July 3, 2025

A volunteer helping a client collect their grocery bag at the Holy Apostles Soup Kitchen…

Jeff Bezos Ties The Knot—And Sells $737 Million In Stock

July 2, 2025

Here’s How Much The Bezos-Sánchez Wedding Extravaganza Really Cost

June 29, 2025

Wedding Protesters Say Bezos Should Pay More Tax. Here’s How Much He Likely Did Pay

June 28, 2025
Our Picks

NYC’s Robin Hood Charity Condemns Newly-Passed Senate Bill. Its Billionaire Donors Are Staying Mum

July 3, 2025

Denny’s and Waffle House remove egg surcharges as prices fall

July 3, 2025

One Tech Tip: Get the most out of ChatGPT and other AI chatbots with better prompts

July 3, 2025

Women buck trend, look to grow rodeo sport of ranch bronc riding

July 3, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.