24h | 7d | 30d

Overview

  • Mozilla
  • Firefox

27 Mar 2025
Published
28 Mar 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. The original vulnerability was being exploited in the wild. *This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1.

Statistics

  • 5 Posts
  • 19 Interactions

Fediverse

Profile picture

Firefox developers reported CVE-2025-2857, a sandbox vulnerability similar to a zero-day reported this week in Google Chrome.

therecord.media/firefox-sandbo

  • 2
  • 1
  • 21 hours ago
Profile picture

#Firefox に深刻なサンドボックス脱出 #脆弱性 Windows版に限定し修正版を緊急公開 - Reinforz

FirefoxとChromeを繋ぐ脅威の系譜と国家を巻き込む標的型攻撃. 今回のCVE-2025-2857が注目を集める理由のひとつは、Google Chromeのゼロデイ脆弱性「CVE-2025 ...

reinforz.co.jp/bizmedia/76890/

  • 1
  • 1
  • 8 hours ago
Profile picture

The root cause of the Chrome 0-day logical vulnerability CVE-2025-2783, which we discovered used in attacks with sophisticated malware, also affects the Firefox! New CVE-2025-2857 has just been fixed in Firefox 136.0.4 mozilla.org/en-US/security/adv

  • 4
  • 10
  • 23 hours ago
Profile picture

malicious npm packages (again) targeting cryptocurrency projects, CEOs cranky over CVEs, and BlackLock gets pantsed - here's your Friday wrap up in Infosec News 👇

🔗 opalsec.io/daily-news-update-f

Here's a quick rundown of what's inside:

📦 npm Package Nightmare: 10 packages compromised by an infostealer campaign targeting developer environments. Sensitive data was siphoned off to a remote host. Most of the packages are still available on npm, so be careful!
🦊 Firefox Flaw: A critical sandbox escape vulnerability (CVE-2025-2857) patched in Firefox 136.0.4. Windows users, update ASAP! This one's similar to a Chrome zero-day used in espionage campaigns.
🏥 Ransomware Reckoning: Advanced, a UK healthcare IT provider, slapped with a £3.1 million fine after a LockBit ransomware attack. Lack of vulnerability scanning and poor patch management were key factors.
🌐 Extension Exploitation: Browser extensions can be bought and repurposed, posing a sneaky threat to enterprises. An extension was bought for $50 and was quickly repurposed to redirect traffic.
⚡ Solar Scare: Dozens of vulnerabilities in solar inverters could let attackers disrupt power grids. Remote code execution, device takeover, and more are possible.
😠 CrushFTP Clash: CEO responds aggressively to VulnCheck after critical unauthenticated access vulnerability (CVE-2025-2825) is released. Vulnerability disclosure and patching processes need to be improved!
🕵️‍♀️ Pegasus in Serbia: Journalists targeted with Pegasus spyware, marking the third time in two years that Amnesty has found Pegasus deployed against Serbian civil society.
🤖 Mamont Malware: Russian authorities arrest three for developing the Mamont Android banking trojan. This malware steals financial data and spreads through Telegram.
🦹 Ransomware Reverse: Resecurity infiltrates the BlackLock ransomware gang, gathering intel to help victims. LFI vulnerability exploited, and data shared with authorities.

Stay vigilant out there, folks! 🛡️

  • 0
  • 0
  • 22 hours ago
Profile picture

Nuova minaccia su Firefox e Chrome: scoperta un’altra falla critica, aggiornate subito!

Mozilla ha rilasciato aggiornamenti di sicurezza per correggere una vulnerabilità critica che ha interessato il browser Firefox su Windows. Questo intervento arriva pochi giorni dopo che Google ha risolto una falla simile su Chrome, precedentemente sfruttata attivamente come zero-day.

Un attacco riuscito potrebbe consentire a un processo figlio compromesso di ottenere privilegi elevati dal processo principale, determinando l’uscita dalla sandbox. La vulnerabilità, che ha interessato sia Firefox che Firefox ESR, è stata risolta con le versioni Firefox 136.0.4, Firefox ESR 115.21.1 e Firefox ESR 128.8.1.

Al momento, non ci sono evidenze di exploit attivi della CVE-2025-2857.

La vulnerabilità, identificata come CVE-2025-2857, è stata descritta come un errore nella gestione dei permessi, il quale potrebbe portare a una fuga dalla sandbox di sicurezza.

“In seguito alla recente violazione della sandbox di Chrome (CVE-2025-2783), diversi sviluppatori di Firefox hanno individuato un problema analogo nel nostro sistema di comunicazione inter-processo (IPC)”, ha dichiarato Mozilla in un comunicato.

Anche il team del progetto Tor ha rilasciato un aggiornamento di sicurezza per Tor Browser (versione 14.0.8) per proteggere gli utenti Windows dalla stessa falla.

Nel frattempo, Google ha distribuito la versione 134.0.6998.177/.178 di Chrome per correggere CVE-2025-2783, che è stata sfruttata in attacchi mirati contro media, istituzioni accademiche e enti governativi in Russia.

la Cybersecurity and Infrastructure Security Agency (CISA) degli Stati Uniti ha aggiunto la falla al suo catalogo delle vulnerabilità note sfruttate (KEV), richiedendo alle agenzie federali di applicare le misure di mitigazione necessarie entro il 17 aprile 2025.

L'articolo Nuova minaccia su Firefox e Chrome: scoperta un’altra falla critica, aggiornate subito! proviene da il blog della sicurezza informatica.

  • 0
  • 0
  • 2 hours ago

Overview

  • Google
  • Chrome

26 Mar 2025
Published
28 Mar 2025
Updated

CVSS
Pending
EPSS
9.21%

Description

Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)

Statistics

  • 4 Posts
  • 17 Interactions

Fediverse

Profile picture

#Google has released software updates to address a high-severity vulnerability in #Chrome that is being actively exploited

The vulnerability is tracked as CVE-2025-2783, and when exploited, allows an attacker to bypass Chrome's sandbox protections

Users are advised to patch ASAP

#cybersecurity #vulnerability

bleepingcomputer.com/news/secu

  • 1
  • 1
  • 13 hours ago
Profile picture

The root cause of the Chrome 0-day logical vulnerability CVE-2025-2783, which we discovered used in attacks with sophisticated malware, also affects the Firefox! New CVE-2025-2857 has just been fixed in Firefox 136.0.4 mozilla.org/en-US/security/adv

  • 4
  • 10
  • 23 hours ago
Profile picture

Nuova minaccia su Firefox e Chrome: scoperta un’altra falla critica, aggiornate subito!

Mozilla ha rilasciato aggiornamenti di sicurezza per correggere una vulnerabilità critica che ha interessato il browser Firefox su Windows. Questo intervento arriva pochi giorni dopo che Google ha risolto una falla simile su Chrome, precedentemente sfruttata attivamente come zero-day.

Un attacco riuscito potrebbe consentire a un processo figlio compromesso di ottenere privilegi elevati dal processo principale, determinando l’uscita dalla sandbox. La vulnerabilità, che ha interessato sia Firefox che Firefox ESR, è stata risolta con le versioni Firefox 136.0.4, Firefox ESR 115.21.1 e Firefox ESR 128.8.1.

Al momento, non ci sono evidenze di exploit attivi della CVE-2025-2857.

La vulnerabilità, identificata come CVE-2025-2857, è stata descritta come un errore nella gestione dei permessi, il quale potrebbe portare a una fuga dalla sandbox di sicurezza.

“In seguito alla recente violazione della sandbox di Chrome (CVE-2025-2783), diversi sviluppatori di Firefox hanno individuato un problema analogo nel nostro sistema di comunicazione inter-processo (IPC)”, ha dichiarato Mozilla in un comunicato.

Anche il team del progetto Tor ha rilasciato un aggiornamento di sicurezza per Tor Browser (versione 14.0.8) per proteggere gli utenti Windows dalla stessa falla.

Nel frattempo, Google ha distribuito la versione 134.0.6998.177/.178 di Chrome per correggere CVE-2025-2783, che è stata sfruttata in attacchi mirati contro media, istituzioni accademiche e enti governativi in Russia.

la Cybersecurity and Infrastructure Security Agency (CISA) degli Stati Uniti ha aggiunto la falla al suo catalogo delle vulnerabilità note sfruttate (KEV), richiedendo alle agenzie federali di applicare le misure di mitigazione necessarie entro il 17 aprile 2025.

L'articolo Nuova minaccia su Firefox e Chrome: scoperta un’altra falla critica, aggiornate subito! proviene da il blog della sicurezza informatica.

  • 0
  • 0
  • 2 hours ago

Overview

  • Microsoft
  • Windows 10 Version 1809

11 Mar 2025
Published
23 Mar 2025
Updated

CVSS v3.1
HIGH (7.0)
EPSS
0.62%

Description

Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.

Statistics

  • 2 Posts

Fediverse

Profile picture

Seriously, EncryptHub isn't messing around! 🤯 They've jumped *right* on that Windows bug (CVE-2025-26633) that literally *just* got fixed. Talk about moving fast...

So, the exploit? It involves the Microsoft Management Console (MMC), those MSC files, and something called MUIPath. Sounds pretty techy, right? But basically, it's a clever workaround. EncryptHub crafts two MSC files – same name, one legit, one malicious. Windows doesn't double-check properly and ends up loading the nasty one. Boom! 💥

You see, as a pentester, I constantly witness attackers twisting legitimate system functions just like this. Your automated scanners? Yeah, they'll likely miss it completely. This kind of thing really needs hands-on analysis to catch. And yeah, updates are crucial, folks! Make sure you get CVE-2025-26633 patched ASAP. Oh, and those random MSI installers from sources you don't know? Big nope. Steer clear! ☝️

Have you run into attacks like this before? Or maybe you've got some other sneaky Windows tricks up your sleeve? Drop 'em in the comments!

  • 0
  • 0
  • 18 hours ago
Profile picture

(trendmicro.com) A Deep Dive into Water Gamayun's Arsenal and Infrastructure trendmicro.com/en_us/research/

Executive Summary:
This research provides a comprehensive analysis of Water Gamayun (also known as EncryptHub and Larva-208), a suspected Russian threat actor exploiting the MSC EvilTwin zero-day vulnerability (CVE-2025-26633) in Microsoft Management Console. The threat actor employs sophisticated delivery methods including malicious provisioning packages, signed MSI files, and Windows MSC files to deploy multiple custom payloads. Their arsenal includes custom backdoors (SilentPrism and DarkWisp), multiple variants of the EncryptHub Stealer, and known malware like Stealc and Rhadamanthys. The research details the C&C infrastructure, data exfiltration techniques, and persistence mechanisms used by the group. Trend Micro researchers gained access to the C&C server components, enabling them to analyze the architecture, functionality, and evasion techniques employed by the threat actor.

#Cybersecurity #ThreatIntel #PowerShell #DarkWisp #SilentPrism #APT #WaterGamayun #EncryptHub #Russia #Rhadamanthys

  • 0
  • 0
  • 14 hours ago

Overview

  • Fortinet
  • FortiClientEMS

28 Mar 2025
Published
28 Mar 2025
Updated

CVSS v3.1
MEDIUM (5.4)
EPSS
0.09%

KEV

Description

An Improper Neutralization of Input During Web Page Generation in FortiClientEMS version 6.2.0 may allow a remote attacker to execute unauthorized code by injecting malicious payload in the user profile of a FortiClient instance being managed by the vulnerable system.

Statistics

  • 1 Post
  • 11 Interactions

Fediverse

Profile picture

Fortinet published another CVE for a vuln from 2019. Just something to keep in mind when people blame Fortinet shops when they get popped by unpatched vulns.

nvd.nist.gov/vuln/detail/CVE-2

  • 7
  • 4
  • 20 hours ago

Overview

  • CrushFTP
  • CrushFTP

26 Mar 2025
Published
28 Mar 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.05%

KEV

Description

CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected by a vulnerability that may result in unauthenticated access. Remote and unauthenticated HTTP requests to CrushFTP may allow attackers to gain unauthorized access.

Statistics

  • 2 Posts

Fediverse

Profile picture

En las últimas 24 horas, una vulnerabilidad en CrushFTP y el malware 'SparrowDoor' de FamousSparrow amenazan la seguridad digital; además, un dominio de Microsoft Stream ha sido secuestrado para enviar spam. Evita riesgos revisando tus configuraciones y actualizaciones. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 28/03/25 📆 |====

🔒 CRUSHFTP AUTENTICACIÓN BYPASS: IOCs
La vulnerabilidad de bypass de autenticación en CrushFTP (CVE-2025-2825) podría permitir a los atacantes obtener acceso administrativo. Es crucial conocer los Indicadores de Compromiso (IoCs) relacionados con esta amenaza y probar la exposición utilizando NodeZero. ¡No olvides aplicar el parche ahora para proteger tu sistema! 👉 djar.co/yGYTw

🌐 HACKERS FAMOUSSPARROW DESPLIEGAN MALWARE MEJORADO EN ATACOS
Un grupo de ciberespionaje vinculado a China, conocido como 'FamousSparrow', ha sido observado usando una nueva versión de su puerta trasera característica 'SparrowDoor' para atacar a una organización comercial en EE.UU. Mantente alerta y actualiza tus defensas ante este tipo de amenazas. Descubre más aquí 👉 djar.co/c68w

⚠️ DOMINIO SECUESTRADO DE MICROSOFT STREAM ENVÍA SPAM A SITIOS SHAREPOINT
El dominio heredado de Microsoft Stream ha sido secuestrado para mostrar un sitio falso de Amazon que promociona un casino en Tailandia, lo que afecta a todos los sitios de SharePoint con videos antiguos incrustados. Asegúrate de revisar las configuraciones de tu dominio para evitar ser víctima de este tipo de ataques. Más información 👉 djar.co/c2ZXsF

🔍 ESTRATEGIA SHELBY: LABORATORIOS DE SEGURIDAD ELÁSTICA
Un análisis profundo del abuso de REF8685 en GitHub revela cómo los atacantes están utilizando esta técnica para establecer comunicaciones no autorizadas (C2) y evadir defensas. Conocer estas tácticas puede ayudarte a reforzar la seguridad de tus sistemas. Conoce más detalles aquí 👉 djar.co/BORI

🖥️ ACTUALIZACIONES RECIENTES DE WINDOWS SERVER 2025 CAUSAN CONGELAMIENTOS EN ESCRITORIO REMOTO
Microsoft ha confirmado que los sistemas de Windows Server 2025 están experimentando congelamientos de escritorio remoto tras instalar actualizaciones de seguridad desde febrero de 2025. Se recomienda a los administradores que evalúen el impacto de estas actualizaciones en sus entornos de trabajo. Infórmate mejor aquí 👉 djar.co/Btn2i

📶 DENTRO DE UN REPETIDOR FAKE DE WIFI
La proliferación de dispositivos electrónicos falsos es un fenómeno creciente. Este artículo explora los peligros asociados con dispositivos como repetidores de WiFi falsos y sus implicaciones para la seguridad personal y de red. Protege tus datos y equipos aprendiendo sobre este problema. Lee más aquí 👉 djar.co/nLx0u

🖼️ EL PELIGRO DE LAS FOTOS MANIPULADAS CON IA: ACOSO Y SUICIDIO
La difusión de fotos alteradas con inteligencia artificial se ha convertido en una grave amenaza para la salud mental y la privacidad de las personas. Es importante estar conscientes de las repercusiones y tomar medidas para protegerse y apoyar a quienes han sido afectados. Explora el tema aquí 👉 djar.co/NXGXEV

  • 0
  • 0
  • 23 hours ago
Profile picture

malicious npm packages (again) targeting cryptocurrency projects, CEOs cranky over CVEs, and BlackLock gets pantsed - here's your Friday wrap up in Infosec News 👇

🔗 opalsec.io/daily-news-update-f

Here's a quick rundown of what's inside:

📦 npm Package Nightmare: 10 packages compromised by an infostealer campaign targeting developer environments. Sensitive data was siphoned off to a remote host. Most of the packages are still available on npm, so be careful!
🦊 Firefox Flaw: A critical sandbox escape vulnerability (CVE-2025-2857) patched in Firefox 136.0.4. Windows users, update ASAP! This one's similar to a Chrome zero-day used in espionage campaigns.
🏥 Ransomware Reckoning: Advanced, a UK healthcare IT provider, slapped with a £3.1 million fine after a LockBit ransomware attack. Lack of vulnerability scanning and poor patch management were key factors.
🌐 Extension Exploitation: Browser extensions can be bought and repurposed, posing a sneaky threat to enterprises. An extension was bought for $50 and was quickly repurposed to redirect traffic.
⚡ Solar Scare: Dozens of vulnerabilities in solar inverters could let attackers disrupt power grids. Remote code execution, device takeover, and more are possible.
😠 CrushFTP Clash: CEO responds aggressively to VulnCheck after critical unauthenticated access vulnerability (CVE-2025-2825) is released. Vulnerability disclosure and patching processes need to be improved!
🕵️‍♀️ Pegasus in Serbia: Journalists targeted with Pegasus spyware, marking the third time in two years that Amnesty has found Pegasus deployed against Serbian civil society.
🤖 Mamont Malware: Russian authorities arrest three for developing the Mamont Android banking trojan. This malware steals financial data and spreads through Telegram.
🦹 Ransomware Reverse: Resecurity infiltrates the BlackLock ransomware gang, gathering intel to help victims. LFI vulnerability exploited, and data shared with authorities.

Stay vigilant out there, folks! 🛡️

  • 0
  • 0
  • 22 hours ago

Overview

  • benoitc
  • benoitc/gunicorn

20 Mar 2025
Published
20 Mar 2025
Updated

CVSS v3.0
HIGH (7.5)
EPSS
0.04%

KEV

Description

Gunicorn version 21.2.0 does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it vulnerable to TE.CL request smuggling. This vulnerability can lead to cache poisoning, data exposure, session manipulation, SSRF, XSS, DoS, data integrity compromise, security bypass, information leakage, and business logic abuse.

Statistics

  • 1 Post
  • 3 Interactions

Fediverse

Profile picture

This has been a busy month for Malcolm! I pushed hard to get v25.03.0 out earlier this month, as it contained pretty much just the Keycloak integration one of our partners (and major funding sources) was waiting for. Rather than wait until April for the other stuff that would have gone into the regular end-of-the-month release, I decided to pull those items into this smaller release just a week and a half after the last one.

Malcolm v25.03.1 contains a few enhancements, bug fixes, and several component version updates, including one that addresses a CVE that may affect Hedgehog Linux Kiosk mode and Malcolm's API container.

NOTE: If you have not already upgraded to v25.03.0, read the notes for v25.02.0 and v25.03.0 and follow the Read Before Upgrading instructions on those releases.

Changes in this release

  • ✨ Features and enhancements
    • Incorporate new S7comm device identification log, s7comm_known_devices.log (#622)
    • Display current PCAP, Zeek, and Suricata capture results in Hedgehog Linux Kiosk mode (#566)
    • Keycloak authentication: configurable group or role membership restrictions for login (#633) (see Requiring user groups and realm roles)
    • Mark newly-discovered and uninventoried devices in logs during NetBox enrichment (#573)
    • Added "Apply recommended system tweaks automatically without asking for confirmation?" question to install.py to allow the user to accept changes to sysctl.conf, grub kernel parameters, etc., without having to answer "yes" to each one.
  • ✅ Component version updates
  • 🐛 Bug fixes
    • Fix install.py error when answering yes to "Pull Malcolm images?" with podman (#604)
    • Order of user-provided tags from PCAP upload interface not preserved (#624)
  • 📄 Configuration changes (in environment variables in ./config/) for Malcolm and in control_vars.conf for Hedgehog Linux
  • 🧹 Code and project maintenance
    • Ensure Malcolm's NetBox configuration Python scripts are baked into the image in addition to bind-mounting them in docker-compose.yml at runtime.

Malcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻‍♀️.

Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.

Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.

As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.

  • 3
  • 0
  • 19 hours ago

Overview

  • kubernetes
  • ingress-nginx

24 Mar 2025
Published
27 Mar 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
81.40%

KEV

Description

A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

Statistics

  • 2 Posts
  • 5 Interactions

Fediverse

Profile picture

Critical Kubernetes controller flaws: 4,000 IPs exposed, with patch urgency increasing due to code to exploit CVE-2025-1974 vulnerability being published databreachtoday.com/critical-k

  • 0
  • 0
  • 1 hour ago
Profile picture

Ingress-NGINX Kubernetes RCE

IngressNightmare vulnerability (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974)

  • 1
  • 4
  • 21 hours ago

Overview

  • Exim
  • libspf2

03 May 2024
Published
28 Mar 2025
Updated

CVSS v3.0
HIGH (7.5)
EPSS
1.25%

KEV

Description

Exim libspf2 Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Exim libspf2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of SPF macros. When parsing SPF macros, the process does not properly validate user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17578.

Statistics

  • 1 Post
  • 3 Interactions

Fediverse

Profile picture
use-after-free (maybe?) in libspf2 /by @hanno

https://www.openwall.com/lists/oss-security/2025/03/28/1

Maybe @thezdi could shed some light on CVE-2023-42118 ?
  • 1
  • 2
  • 19 hours ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 3 Interactions

Fediverse

Profile picture

We've released the #Netty incubator QUIC codec version 0.0.71.Final.
This fixes the CVE-2025-29908 hash collision DoS vulnerability.
Release notes: netty.io/news/2025/03/28/quic-

  • 1
  • 2
  • 18 hours ago

Overview

  • Apache Software Foundation
  • Apache Tomcat

10 Mar 2025
Published
21 Mar 2025
Updated

CVSS
Pending
EPSS
88.45%

KEV

Description

Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.

Statistics

  • 1 Post
  • 2 Interactions

Fediverse

Profile picture

(recordedfuture.com) Apache Tomcat: Critical Path Equivalence Vulnerability (CVE-2025-24813) NOT (yet) under active exploitation

recordedfuture.com/blog/apache

Insikt Group notes specifically that this vulnerability has not yet been observed as being actively exploited in the wild.

Summary:
This article details CVE-2025-24813, a critical path equivalence vulnerability in Apache Tomcat that allows unauthenticated remote code execution under specific conditions. The vulnerability affects multiple Tomcat versions (11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, 9.0.0-M1 to 9.0.98, and most 8.5.x versions). Greynoise has identified six malicious IP addresses attempting to exploit this vulnerability, targeting systems in the US, Japan, Mexico, South Korea, and Australia. Multiple proof-of-concept exploits have been published, increasing the risk of exploitation. Organizations are advised to upgrade to patched versions (11.0.3, 10.1.35, or 9.0.99) or implement network-level controls if immediate patching isn't possible.

#Cybersecurity #ThreatIntel #Tomcat #ActiveExploitation #ITW #Exploitation #Vulnerability #CVE202524813

  • 1
  • 1
  • 19 hours ago
Showing 1 to 10 of 20 CVEs