Monday, December 1

Apache Tomcat Flaws Allow Remote Code Execution on Vulnerable Servers

0
22

Cybersecurity

The Apache Software Foundation has reported two security vulnerabilities affecting multiple versions of Apache Tomcat, with one posing a significant risk of remote code execution on susceptible servers.

The vulnerabilities affect Apache Tomcat versions 9, 10, and 11, and administrators are advised to upgrade their installations without delay.

Vulnerability Details

CVE ID Vulnerability Severity CVSS Score
CVE-2025-55752 Directory traversal via rewrite with possible RCE if PUT is enabled Important N/A
CVE-2025-55754 Console manipulation via escape sequences in log messages Low N/A

Critical Directory Traversal Flaw Enables RCE

The most severe vulnerability, CVE-2025-55752, is rated as “Important” and originates from a regression during a previous bug fix.

This directory traversal flaw allows attackers to manipulate request URIs through rewritten URLs that are normalized before being decoded.

The vulnerability impacts rewrite rules that handle query parameters, potentially bypassing security constraints on sensitive directories like /WEB-INF/ and /META-INF/.

If PUT requests are enabled, attackers could exploit the vulnerability to upload malicious files and achieve remote code execution. However, PUT requests are generally restricted to trusted users, reducing the likelihood of exploitation in production environments.

The issue affects Apache Tomcat versions 11.0.0-M1 through 11.0.10, 10.1.0-M1 through 10.1.44, and 9.0.0.M11 through 9.0.108, as discovered by security researcher Chumy Tsai from CyCraft Technology.

Console Manipulation Through Escape Sequences

The second vulnerability, CVE-2025-55754, carries a lower severity but still presents security concerns.

This vulnerability involves Apache Tomcat’s failure to properly escape ANSI escape sequences in log messages.

When running in a console environment on Windows systems that support ANSI escape sequences, specially crafted URLs can inject malicious escape sequences into log outputs.

These sequences can manipulate console displays and clipboard contents, potentially leading system administrators to execute attacker-controlled commands. While primarily observed on Windows platforms, similar attack vectors may exist on other operating systems.

The issue, identified by Elysee Franchuk of MOBIA Technology Innovations, affects Apache Tomcat versions 9, 10, and 11.

Mitigation and Updates

Apache has released patched versions to address both vulnerabilities. Organizations using affected Tomcat installations should upgrade to version 11.0.11, 10.1.45, or 9.0.109, depending on their deployment.

The security updates were announced on Mon, Oct 27, 2025. Detailed mitigation guidance is available through Apache’s official security advisories for each affected version series.

Comments are closed.