Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN512
_____________________________________________________________________

DATE                : 14/08/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache Tomcat versions prior to
                             11.0.10, 10.1.42, 9.0.106.

=====================================================================
https://lists.apache.org/thread/v6bknr96rl7l1qxkl1c03v0qdvbbqs47
https://lists.apache.org/thread/ol4l3or2l30czzp608w5f2n8yohnjk8o
_____________________________________________________________________

[SECURITY] CVE-2025-55668 Apache Tomcat - Session fixation via rewrite
valve


CVE-2025-55668 Apache Tomcat - Session fixation via rewrite valve

Severity: Moderate

Vendor: The Apache Software Foundation

Versions Affected:
Apache Tomcat 11.0.0-M1 to 11.0.7
Apache Tomcat 10.1.0-M1 to 10.1.41
Apache Tomcat 9.0.0.M1 to 9.0.105
Older, EOL versions may also be affected

Description:
If the rewrite valve was enabled for a web application, an attacker
was able to craft a URL that, if a victim clicked on it, would
cause the victim's interaction with that resource to occur in the
context of the attacker's session.


Mitigation:
Users of the affected versions should apply one of the following
mitigations:
- Upgrade to Apache Tomcat 11.0.8 or later
- Upgrade to Apache Tomcat 10.1.42 or later
- Upgrade to Apache Tomcat 9.0.106 or later


Credit:
Greg K (https://github.com/gregk4sec)


History:
2025-08-13 Original advisory


References:
[1] https://tomcat.apache.org/security-11.html
[2] https://tomcat.apache.org/security-10.html
[3] https://tomcat.apache.org/security-9.html

_____________________________________________________________________

[SECURITY] CVE-2025-48989 Apache Tomcat - DoS in HTP/2 - Made You
Reset

CVE-2025-48989 Apache Tomcat - DoS in HTTP/2 - Made You Reset

Severity: High

Vendor: The Apache Software Foundation

Versions Affected:
Apache Tomcat 11.0.0-M1 to 11.0.9
Apache Tomcat 10.1.0-M1 to 10.1.43
Apache Tomcat 9.0.0.M1 to 9.0.107
Older, EOL versions may also be affected


Description:
Tomcat's HTTP/2 implementation was vulnerable to the made you reset 
attack. The denial of service typically manifested as an
OutOfMemoryError.


Mitigation:
Users of the affected versions should apply one of the following
mitigations:
- Upgrade to Apache Tomcat 11.0.10 or later
- Upgrade to Apache Tomcat 10.1.44 or later
- Upgrade to Apache Tomcat 9.0.108 or later


Credit:
The vulnerability was identified by Gal Bar Nahum, Anat Bremler-Barr, 
and Yaniv Harel of Tel Aviv University


History:
2025-08-13 Original advisory


References:
[1] https://tomcat.apache.org/security-11.html
[2] https://tomcat.apache.org/security-10.html
[3] https://tomcat.apache.org/security-9.html


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
