CVE-2025-55668

6.5 MEDIUM

📋 TL;DR

This CVE describes a session fixation vulnerability in Apache Tomcat's rewrite valve that allows attackers to hijack user sessions. Attackers can fixate session IDs before authentication, then use those sessions after users log in. This affects Tomcat 9.x, 10.x, and 11.x within specific version ranges.

💻 Affected Systems

Products:
  • Apache Tomcat
Versions: 11.0.0-M1 through 11.0.7, 10.1.0-M1 through 10.1.41, 9.0.0.M1 through 9.0.105
Operating Systems: All platforms running affected Tomcat versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires rewrite valve configuration to be vulnerable. Older EOL versions may also be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to authenticated user sessions, potentially compromising sensitive data or performing privileged actions as legitimate users.

🟠

Likely Case

Session hijacking leading to unauthorized access to user accounts and potential data exposure.

🟢

If Mitigated

Limited impact with proper session management controls, but still presents authentication bypass risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to set session IDs and knowledge of rewrite valve configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.0.8, 10.1.42, or 9.0.106

Vendor Advisory: https://lists.apache.org/thread/v6bknr96rl7l1qxkl1c03v0qdvbbqs47

Restart Required: Yes

Instructions:

1. Download patched version from Apache Tomcat website. 2. Backup current installation. 3. Replace Tomcat installation with patched version. 4. Restart Tomcat service.

🔧 Temporary Workarounds

Disable Rewrite Valve

all

Remove or comment out rewrite valve configuration in server.xml

Edit $CATALINA_HOME/conf/server.xml and remove or comment out <Valve className="org.apache.catalina.valves.rewrite.RewriteValve" />

🧯 If You Can't Patch

  • Implement additional session validation in applications to detect session fixation attempts
  • Configure web application firewalls to monitor for session manipulation patterns

🔍 How to Verify

Check if Vulnerable:

Check Tomcat version and verify rewrite valve is configured in server.xml

Check Version:

java -cp $CATALINA_HOME/lib/catalina.jar org.apache.catalina.util.ServerInfo

Verify Fix Applied:

Verify Tomcat version is 11.0.8+, 10.1.42+, or 9.0.106+

📡 Detection & Monitoring

Log Indicators:

  • Multiple session creations from same IP with different session IDs
  • Session ID changes after authentication

Network Indicators:

  • Unusual session parameter manipulation in HTTP requests

SIEM Query:

source="tomcat" AND (event="SESSION_CREATED" OR event="SESSION_ID_CHANGED")

🔗 References

📤 Share & Export