![]() |
|
Message-ID: <6f098cf1-6aba-4e35-b72f-af8994cef75d@apache.org> Date: Mon, 16 Jun 2025 15:18:47 +0100 From: Mark Thomas <markt@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-49125: Apache Tomcat: Security constraint bypass for pre/post-resources Severity: moderate Affected versions: - Apache Tomcat 11.0.0-M1 through 11.0.7 - Apache Tomcat 10.1.0-M1 through 10.1.41 - Apache Tomcat 9.0.0.M1 through 9.0.105 Description: Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat. When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue. Credit: Greg K (https://github.com/gregk4sec) (finder) References: https://lists.apache.org/thread/m66cytbfrty9k7dc4cg6tl1czhsnbywk https://tomcat.apache.org/ https://www.cve.org/CVERecord?id=CVE-2025-49125
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.