CVE-2025-55752 Apache Tomcat - Directory traversal via rewrite with possible RCE if PUT is enabled

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
Apache Tomcat 11.0.0-M1 to 11.0.10
Apache Tomcat 10.1.0-M1 to 10.1.44
Apache Tomcat 9.0.0.M11 to 9.0.108
Older, EOL versions may also be affected

Description:
The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI.

Mitigation:
Users of the affected versions should apply one of the following
mitigations:
- Upgrade to Apache Tomcat 11.0.11 or later
- Upgrade to Apache Tomcat 10.1.45 or later
- Upgrade to Apache Tomcat 9.0.109 or later

Credit:
Chumy Tsai (github.com/Jimmy01240397) @ CyCraft Technology Intern

History:
2025-10-27 Original advisory

References:
[1] https://tomcat.apache.org/security-11.html
[2] https://tomcat.apache.org/security-10.html
[3] https://tomcat.apache.org/security-9.html


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to