Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks

Posted on June 17, 2025June 17, 2025 By CWS

A number of crucial safety vulnerabilities affecting Apache Tomcat internet servers, together with two high-severity flaws enabling denial-of-service (DoS) assaults and one moderate-severity vulnerability permitting authentication bypass. 

These vulnerabilities, recognized as CVE-2025-48976, CVE-2025-48988, CVE-2025-49124, and CVE-2025-49125, affect hundreds of thousands of internet functions worldwide working on affected Tomcat variations spanning from 9.0.x to 11.0.x collection. 

The vulnerabilities have been reported on June 16, 2025, by safety researcher Mark Thomas, with speedy patches accessible throughout all affected model branches.

CVE-2025-48976: Reminiscence Exhaustion through Multipart Header Exploitation

The CVE-2025-48976 vulnerability stems from a set reminiscence allocation limitation in Apache Commons FileUpload, a part integral to Tomcat’s multipart request processing. 

Previous to patching, the library enforced a hard-coded 10kB restrict for particular person half headers inside multipart requests. Attackers may craft requests containing quite a few elements with headers approaching this restrict, forcing Tomcat to allocate extreme reminiscence proportional to the variety of elements. 

As an illustration, a request containing 1,000 elements would devour roughly 10MB of reminiscence solely for headers, probably triggering out-of-memory errors and repair disruption. 

Affected variations embody Tomcat 9.0.0.M1–9.0.105, 10.1.0-M1–10.1.41, and 11.0.0-M1–11.0.7.

CVE-2025-48988: Multipart Add Useful resource Exhaustion

CVE-2025-48988 exploits Tomcat’s failure to distinguish between request parameters and multipart elements when implementing dimension limits. 

Not like normal parameters, multipart elements embody headers that persist in reminiscence all through request processing. 

Attackers may ship requests with a excessive half depend (e.g., 10,000 elements), every with minimal payload however headers consuming ~500 bytes. This is able to allocate ~5MB per request, enabling fast reminiscence exhaustion. 

The vulnerability’s severity is compounded by Tomcat’s default dealing with of concurrent connections, permitting attackers to amplify affect by means of parallel requests. 

CVE-2025-49124: Home windows Installer Aspect-Loading Threat

CVE-2025-49124 targets the Tomcat Home windows installer’s insecure invocation of icacls.exe, a utility for modifying entry management lists (ACLs). 

By omitting the total path to C:WindowsSystem32icacls.exe, the installer turns into weak to PATH surroundings variable manipulation. An attacker with write entry to directories earlier within the PATH may place a malicious icacls.exe, which the installer would execute throughout Tomcat setup. 

This privilege escalation vector may allow unauthorized service configuration modifications or persistence mechanisms. 

CVE-2025-49125: Safety Constraint Bypass in Useful resource Mounting

The CVE-2025-49125 vulnerability permits attackers to bypass authentication and authorization controls for PreResources and PostResources configured exterior the net utility root. 

The difficulty arises from Tomcat’s failure to normalize useful resource paths earlier than making use of safety insurance policies, enabling URL manipulation assaults. 

Quick Patching Required 

Organizations should prioritize speedy updates to handle these vulnerabilities. The Apache Software program Basis has launched patches throughout all affected model branches: Apache Tomcat 11.0.8, Apache Tomcat 10.1.42, and Apache Tomcat 9.0.106. 

These updates introduce configurable limits, together with maxPartHeaderSize (default 512 bytes) and maxPartCount (default 10 elements) parameters on the Connector configuration.

System directors ought to confirm their Tomcat installations and implement configuration modifications to the server.xml file, particularly adjusting Connector parameters to forestall useful resource exhaustion assaults whereas sustaining utility performance.

Reside Credential Theft Assault Unmask & Immediate Protection – Free Webinar

Cyber Security News Tags:Apache, Attackers, Attacks, Authentication, Bypass, DoS, Tomcat, Trigger, Vulnerabilities

Post navigation

Previous Post: Meta Starts Showing Ads on WhatsApp After 6-Year Delay From 2018 Announcement
Next Post: Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer

Related Posts

TA829 Hackers Employs New TTPs and Upgraded RomCom Backdoor to Evade Detections Cyber Security News
Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale Cyber Security News
New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands Cyber Security News
New Blitz Malware Attacking Windows Servers to Deploy Monero Miner Cyber Security News
CISA Warns of Rails Ruby on Rails Path Traversal Vulnerability Exploited in Attacks Cyber Security News
Hackers Exploiting SAP NetWeaver Vulnerability to Deploy Auto-Color Linux Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News