CVE-2025-24813于年初发现,并在三月由Tomcat官方对外公开披露,下面以漏洞发现者的视角谈谈该漏洞的全部利用方式和要点 Important: Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet -CVE-2025-24813 The original implementation of partial PUT used a temporary file based on the user provided file name and path with the path separator replaced by ".". If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: ●writes enabled for the default servlet (disabled by default) ●support for partial PUT (enabled by default) ●a target URL for security sensitive uploads that is a sub-directory of a target URL for public uploads ●attacker knowledge of the names of security sensitive files being uploaded ●the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: ●writes enabled for the default servlet (disabled by default) ●support for partial PUT (enabled by default) ●application was using Tomcat's file based session persistence with the default storage location ●application included a library that may be leveraged in a deserialization attack
没有评论