mastodon.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
A newer server operated by the Mastodon gGmbH non-profit

Server stats:

11K
active users

#tomcat

4 posts3 participants0 posts today

Apache Tomcat Vulnerability Actively Exploited to Carry out Remote Code Execution

Pulse ID: 67ea98de56c6392506302862
Pulse Link: otx.alienvault.com/pulse/67ea9
Pulse Author: cryptocti
Created: 2025-03-31 13:30:06

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Apache Tomcat: CVE-2025-24813: Active Exploitation

A critical path equivalence vulnerability in Apache Tomcat, CVE-2025-24813, allows unauthenticated attackers to execute arbitrary code on vulnerable servers under specific conditions. The vulnerability affects Tomcat versions 11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, 9.0.0.M1 to 9.0.98, and certain 8.5.x versions. Exploitation requires specific server configurations and involves sending malicious PUT and GET requests. Six malicious IP addresses have been identified attempting to exploit this vulnerability, targeting systems in the US, Japan, Mexico, South Korea, and Australia. Multiple proof-of-concept exploits have been published, increasing the likelihood of ongoing exploitation attempts. Users are advised to upgrade to patched versions or implement network-level controls to restrict access to the Tomcat server.

Pulse ID: 67e6c6b6dd57e4c62a1a8d1f
Pulse Link: otx.alienvault.com/pulse/67e6c
Pulse Author: AlienVault
Created: 2025-03-28 15:56:38

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Descubra o Poder do Tomcat: 5 Razões para Usar! 🚀

Pensando em otimizar seu servidor web? O Tomcat é a escolha perfeita! Com sua leveza e flexibilidade, ele se destaca no mundo do open source. Confira 5 motivos para adotar o Tomcat e leve sua infraestrutura de TI a um novo patamar. Vamos inovar juntos?

👉 Leia mais no blog: nova.escolalinux.com.br/blog/t

Paulo OliveiraTomcat - 5 motivos para você começar a usarO administrador de sistemas é um profissional de extrema importância, principalmente para empresas que desejam ter um sistema de computadores em rede eficiente.

(recordedfuture.com) Apache Tomcat: Critical Path Equivalence Vulnerability (CVE-2025-24813) NOT (yet) under active exploitation

recordedfuture.com/blog/apache

Insikt Group notes specifically that this vulnerability has not yet been observed as being actively exploited in the wild.

Summary:
This article details CVE-2025-24813, a critical path equivalence vulnerability in Apache Tomcat that allows unauthenticated remote code execution under specific conditions. The vulnerability affects multiple Tomcat versions (11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, 9.0.0-M1 to 9.0.98, and most 8.5.x versions). Greynoise has identified six malicious IP addresses attempting to exploit this vulnerability, targeting systems in the US, Japan, Mexico, South Korea, and Australia. Multiple proof-of-concept exploits have been published, increasing the risk of exploitation. Organizations are advised to upgrade to patched versions (11.0.3, 10.1.35, or 9.0.99) or implement network-level controls if immediate patching isn't possible.

www.recordedfuture.comApache Tomcat: CVE-2025-24813: Active ExploitationLearn about CVE-2025-24813 affecting Apache Tomcat products. Patch now to prevent remote code execution.

(horizon3.ai) What to know about recent Github Actions and Apache Tomcat vulnerabilities—before you investigate horizon3.ai/attack-research/at

The article from Horizon3 analyzes two recent high-profile vulnerabilities: CVE-2025-30066 affecting GitHub Actions (tj-actions/changed-files) and CVE-2025-24813 affecting Apache Tomcat. Despite widespread publicity, Horizon3.ai's Attack Team found that actual exploitation risk is significantly lower than reported. For the GitHub Actions vulnerability, only one repository among 1,200 examined was exposed, with no evidence of data exfiltration. For Apache Tomcat, analysis of over 10,000 endpoints revealed no vulnerable configurations in production environments. The article emphasizes the importance of prioritizing security responses based on actual risk rather than media hype.

Red alarm light against a metal wall with vertical ridges
Horizon3.ai · GitHub Actions & Apache Tomcat CVEs: Risk or Hype?Explore CVE-2025-30066 and CVE-2025-24813 with real-world data from Horizon3.ai to assess whether these vulnerabilities are truly critical or overhyped.
Continued thread

La última vez que lo "toqué" fue porque alguien se había equivocado en el engine a configurar en un servicio de Spring en lugar de utilizar jetty, pero sí supongo que habrá kilómetros de Java corriendo por ahí como los hay de COBOL #Tomcat #Java

Descubra o Poder do Tomcat: 5 Razões para Usar! 🚀

Pensando em otimizar seu servidor web? O Tomcat é a escolha perfeita! Com sua leveza e flexibilidade, ele se destaca no mundo do open source. Confira 5 motivos para adotar o Tomcat e leve sua infraestrutura de TI a um novo patamar. Vamos inovar juntos?

👉 Leia mais no blog: nova.escolalinux.com.br/blog/t

Paulo OliveiraTomcat - 5 motivos para você começar a usarO administrador de sistemas é um profissional de extrema importância, principalmente para empresas que desejam ter um sistema de computadores em rede eficiente.

Security researchers reveal active exploitation against #Apache #Tomcat vulnerability

The vulnerability is tracked as CVE-2025-24813, and when exploited, allows an attacker to remotely execute code

Administrators are advised to patch ASAP

#cybersecurity #threatintel

bleepingcomputer.com/news/secu

BleepingComputer · Critical RCE flaw in Apache Tomcat actively exploited in attacksBy Bill Toulas