In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade org.apache.tomcat.embed:tomcat-embed-core
to version 9.0.99, 10.1.35, 11.0.3 or higher.
org.apache.tomcat.embed:tomcat-embed-core is a Core Tomcat implementation.
Affected versions of this package are vulnerable to Path Equivalence in the doPut()
function in DefaultServlet.java
, which insecurely replaces path separators with .
s.
If the Default Servlet is configured with writes enabled - which it is not by default - a user can exploit Tomcat's partial PUT
functionality to achieve code execution via deserialization. The target URL containing sensitive uploaded files must be a sub-directory of a target URL for public uploads, and the malicious user must know the names of the target sensitive files, which are also uploaded using a partial PUT
. If both attacker and target application are using the default storage location and it contains a library that deserializes untrusted code, the attacker can trigger the execution of malicious code.