More

    A worrying critical security flaw in Apache Tomcat could let hackers take over servers with ease




    • Security outfit Wallarm spotted a PoC in the wild
    • The method abuses a deserialization flaw in Apache Tomcat
    • It allows attackers to fully take over vulnerable endpoints

    A deserialization vulnerability on Apache Tomcat servers is being abused in the wild to completely take over affected endpoints, security researchers are warning.

    Wallarm has revealed it saw a Chinese forum user, alias iSee857, share a proof-of-concept (PoC) for a flaw tracked as CVE-2025-24813, warning threat actors only need one PUT API request to take over the vulnerable server. The request is used to upload a malicious serialized Java session, which then allows the attacker to trigger deserialization by referencing the malicious session ID in a GET request.

    https://cdn.mos.cms.futurecdn.net/V5UoHpQhbFJU2bGSSKCRYM-1200-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img