CVE-2025-55752

7.5 HIGH

📋 TL;DR

A path traversal vulnerability in Apache Tomcat allows attackers to bypass security constraints protecting sensitive directories like /WEB-INF/ and /META-INF/. This affects Tomcat versions 9.0.0.M11 through 9.0.108, 10.1.0-M1 through 10.1.44, and 11.0.0-M1 through 11.0.10. If PUT requests are enabled, this could lead to remote code execution.

💻 Affected Systems

Products:
  • Apache Tomcat
Versions: 9.0.0.M11 through 9.0.108, 10.1.0-M1 through 10.1.44, 11.0.0-M1 through 11.0.10, and EOL versions 8.5.6 through 8.5.100
Operating Systems: All operating systems running affected Tomcat versions
Default Config Vulnerable: ✅ No
Notes: Requires specific rewrite rule configuration that rewrites query parameters to the URL. PUT requests must also be enabled for worst-case RCE scenario.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution via malicious file upload if PUT requests are enabled and rewrite rules manipulate query parameters

🟠

Likely Case

Bypass of security constraints allowing access to protected directories and sensitive files

🟢

If Mitigated

Limited impact if PUT requests are disabled and proper access controls are in place

🌐 Internet-Facing: MEDIUM - Requires specific rewrite rule configuration and PUT requests enabled, which is uncommon
🏢 Internal Only: LOW - Internal systems typically have additional layers of security and less likely to have vulnerable configurations

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires specific rewrite rule configuration. PUT requests are normally limited to trusted users and unlikely to be enabled with vulnerable rewrite rules.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.0.11+, 10.1.45+, or 9.0.109+

Vendor Advisory: https://lists.apache.org/thread/n05kjcwyj1s45ovs8ll1qrrojhfb1tog

Restart Required: Yes

Instructions:

1. Download patched version from Apache Tomcat website. 2. Stop Tomcat service. 3. Backup current installation. 4. Replace with patched version. 5. Restart Tomcat service.

🔧 Temporary Workarounds

Disable PUT requests

all

Prevents file upload exploitation by disabling HTTP PUT method

Edit web.xml to remove PUT method from allowed methods or configure security constraints

Remove vulnerable rewrite rules

all

Remove or modify rewrite rules that rewrite query parameters to the URL

Review and modify rewrite rules in conf/server.xml or rewrite.config files

🧯 If You Can't Patch

  • Disable PUT requests in Tomcat configuration
  • Implement WAF rules to block path traversal attempts and PUT requests to sensitive paths

🔍 How to Verify

Check if Vulnerable:

Check Tomcat version and verify if running affected version with rewrite rules that manipulate query parameters

Check Version:

Check catalina.out logs or run: java -cp lib/catalina.jar org.apache.catalina.util.ServerInfo

Verify Fix Applied:

Verify Tomcat version is 11.0.11+, 10.1.45+, or 9.0.109+

📡 Detection & Monitoring

Log Indicators:

  • Unusual PUT requests to sensitive paths
  • Access attempts to /WEB-INF/ or /META-INF/ directories
  • URLs with encoded path traversal sequences

Network Indicators:

  • HTTP requests with encoded characters in URLs targeting sensitive paths
  • PUT requests to Tomcat servers

SIEM Query:

source="tomcat_access.log" AND (uri="*%2e%2e%2f*" OR uri="*%252e%252e%252f*" OR method="PUT" AND uri="*/WEB-INF/*" OR uri="*/META-INF/*")

🔗 References

📤 Share & Export