Bug#1108114: tomcat11: CVE-2025-49125

Salvatore Bonaccorso carnil at debian.org
Fri Jun 20 20:43:02 BST 2025


Source: tomcat11
Version: 11.0.6-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
Control: clone -1 -2
Control: reassign -2 src:tomcat10 10.1.40-1
Control: retitle -2 tomcat10: CVE-2025-49125




*** /tmp/tomcat11.reportbug
Package: tomcat11
X-Debbugs-CC: team at security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for tomcat.

CVE-2025-49125[0]:
| Authentication Bypass Using an Alternate Path or Channel
| vulnerability in Apache Tomcat.  When using PreResources or
| PostResources mounted other than at the root of the web application,
| it was possible to access those resources via an unexpected path.
| That path was likely not to be protected by the same security
| constraints as the expected path, allowing those security
| constraints to be bypassed.  This issue affects Apache Tomcat: from
| 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from
| 9.0.0.M1 through 9.0.105.  Users are recommended to upgrade to
| version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-49125
    https://www.cve.org/CVERecord?id=CVE-2025-49125

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore


More information about the pkg-java-maintainers mailing list