[midPoint] Security Advisory: Potential Tomcat RCE Vulnerability (CVE-2025-24813)

Tony Tkacik tony.tkacik at evolveum.com
Tue Mar 18 17:00:06 CET 2025



Date: 18. 03. 2025 


Severity: 6.3 (High) 

Affected versions: All midPoint versions prior to 4.8.7, 4.9.2 

Fixed in versions: 4.8.7, 4.9.2 




Description 

An attacker may exploit vulnerablity CVE-2025-24813 if writes for the default servlet are enabled (this is disabled by default in midPoint). 

Attacker may inject content to files uploaded using Tomcat (midPoint uses Wicket upload instead of Tomcat) and may try deserialization attack using file based session persistance. 




Severity and Impact 

This is High Severity Issue. 

The attacker may be able to create / modify Tomcat uploads on midPoint servers when custom Tomcat configuration is used. 




Mitigation 

Users of affected MidPoint versions are advised to upgrade their deployments to the latest maintenance releases. 

If it is not possible, verify that your Tomcat configuration override does not enable writes for default server. This is usually achieved by modifying application.yml. 




This advisory is also available at [ https://docs.evolveum.com/midpoint/security/advisories/026-potential-tomcat-rce-vulnerability/ | https://docs.evolveum.com/midpoint/security/advisories/026-potential-tomcat-rce-vulnerability/ ] 


-- 
Anton Tkáčik
Software Developer
evolveum.com 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.evolveum.com/pipermail/midpoint/attachments/20250318/98bc7516/attachment.htm>


More information about the midPoint mailing list