Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks

Posted on June 17, 2025June 17, 2025 By CWS

A number of crucial safety vulnerabilities affecting Apache Tomcat internet servers, together with two high-severity flaws enabling denial-of-service (DoS) assaults and one moderate-severity vulnerability permitting authentication bypass. 

These vulnerabilities, recognized as CVE-2025-48976, CVE-2025-48988, CVE-2025-49124, and CVE-2025-49125, affect hundreds of thousands of internet functions worldwide working on affected Tomcat variations spanning from 9.0.x to 11.0.x collection. 

The vulnerabilities have been reported on June 16, 2025, by safety researcher Mark Thomas, with speedy patches accessible throughout all affected model branches.

CVE-2025-48976: Reminiscence Exhaustion through Multipart Header Exploitation

The CVE-2025-48976 vulnerability stems from a set reminiscence allocation limitation in Apache Commons FileUpload, a part integral to Tomcat’s multipart request processing. 

Previous to patching, the library enforced a hard-coded 10kB restrict for particular person half headers inside multipart requests. Attackers may craft requests containing quite a few elements with headers approaching this restrict, forcing Tomcat to allocate extreme reminiscence proportional to the variety of elements. 

As an illustration, a request containing 1,000 elements would devour roughly 10MB of reminiscence solely for headers, probably triggering out-of-memory errors and repair disruption. 

Affected variations embody Tomcat 9.0.0.M1–9.0.105, 10.1.0-M1–10.1.41, and 11.0.0-M1–11.0.7.

CVE-2025-48988: Multipart Add Useful resource Exhaustion

CVE-2025-48988 exploits Tomcat’s failure to distinguish between request parameters and multipart elements when implementing dimension limits. 

Not like normal parameters, multipart elements embody headers that persist in reminiscence all through request processing. 

Attackers may ship requests with a excessive half depend (e.g., 10,000 elements), every with minimal payload however headers consuming ~500 bytes. This is able to allocate ~5MB per request, enabling fast reminiscence exhaustion. 

The vulnerability’s severity is compounded by Tomcat’s default dealing with of concurrent connections, permitting attackers to amplify affect by means of parallel requests. 

CVE-2025-49124: Home windows Installer Aspect-Loading Threat

CVE-2025-49124 targets the Tomcat Home windows installer’s insecure invocation of icacls.exe, a utility for modifying entry management lists (ACLs). 

By omitting the total path to C:WindowsSystem32icacls.exe, the installer turns into weak to PATH surroundings variable manipulation. An attacker with write entry to directories earlier within the PATH may place a malicious icacls.exe, which the installer would execute throughout Tomcat setup. 

This privilege escalation vector may allow unauthorized service configuration modifications or persistence mechanisms. 

CVE-2025-49125: Safety Constraint Bypass in Useful resource Mounting

The CVE-2025-49125 vulnerability permits attackers to bypass authentication and authorization controls for PreResources and PostResources configured exterior the net utility root. 

The difficulty arises from Tomcat’s failure to normalize useful resource paths earlier than making use of safety insurance policies, enabling URL manipulation assaults. 

Quick Patching Required 

Organizations should prioritize speedy updates to handle these vulnerabilities. The Apache Software program Basis has launched patches throughout all affected model branches: Apache Tomcat 11.0.8, Apache Tomcat 10.1.42, and Apache Tomcat 9.0.106. 

These updates introduce configurable limits, together with maxPartHeaderSize (default 512 bytes) and maxPartCount (default 10 elements) parameters on the Connector configuration.

System directors ought to confirm their Tomcat installations and implement configuration modifications to the server.xml file, particularly adjusting Connector parameters to forestall useful resource exhaustion assaults whereas sustaining utility performance.

Reside Credential Theft Assault Unmask & Immediate Protection – Free Webinar

Cyber Security News Tags:Apache, Attackers, Attacks, Authentication, Bypass, DoS, Tomcat, Trigger, Vulnerabilities

Post navigation

Previous Post: Meta Starts Showing Ads on WhatsApp After 6-Year Delay From 2018 Announcement
Next Post: Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer

Related Posts

Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts Cyber Security News
New Technique Uncovered To Exploit Linux Kernel Use-After-Free Vulnerability Cyber Security News
Numerous Applications Using Google’s Firebase Platform Leaking Highly Sensitive Data Cyber Security News
Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts Cyber Security News
Encrypting Data to Meet Global Privacy Law Requirements Cyber Security News
50,000+ Azure AD Users Access Token Exposed From Unauthenticated API Endpoint Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kimsuky Hackers Attacking Users via Weaponized QR Code to Deliver Malicious Mobile App
  • Operation ForumTrol Known for Exploiting Chrome 0-Day Attacking Users With New Phishing Campaign
  • SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances
  • Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
  • 5 SOC Analyst Tips for Super-Fast Triage 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Kimsuky Hackers Attacking Users via Weaponized QR Code to Deliver Malicious Mobile App
  • Operation ForumTrol Known for Exploiting Chrome 0-Day Attacking Users With New Phishing Campaign
  • SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances
  • Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
  • 5 SOC Analyst Tips for Super-Fast Triage 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark