home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 796 of 2,445   
   Mike Powell to All   
   A worrying critical secur   
   18 Mar 25 09:45:00   
   
   TZUTC: -0500   
   MSGID: 511.consprcy@1:2320/105 2c3ec05f   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   A worrying critical security flaw in Apache Tomcat could let hackers take    
   over servers with ease   
      
   Date:   
   Tue, 18 Mar 2025 12:04:10 +0000   
      
   Description:   
   A "dead simple" attack allows threat actors to take over vulnerable Apache   
   Tomcat servers.   
      
   FULL STORY   
   ======================================================================   
    - Security  outfit Wallarm spotted a PoC in the wild   
    - The method abuses a deserialization flaw in Apache Tomcat   
    - It allows attackers to fully take over vulnerable endpoints   
      
   A deserialization vulnerability on Apache Tomcat servers is being abused in   
   the wild to completely take over affected endpoints , security researchers    
   are warning.    
      
   Wallarm has revealed it saw a Chinese forum user, alias iSee857, share a   
   proof-of-concept (PoC) for a flaw tracked as CVE-2025-24813, warning threat   
   actors only need one PUT API request to take over the vulnerable server. The   
   request is used to upload a malicious serialized Java session, which then   
   allows the attacker to trigger deserialization by referencing the malicious   
   session ID in a GET request.    
      
   Tomcat, seeing this session ID, retrieves the stored file, deserializes it,   
   and executes the embedded Java code, granting full remote access to the   
   attacker, Wallarm explained.   
      
   Dead simple    
      
   The researchers added that the attack is dead simple to execute, and requires   
   no authentication. The only requirement is that Tomcat is using file-based   
   session storage which, according to the researchers, is common in many   
   deployments. Furthermore, base64 encoding means the attack will bypass most   
   traditional security filters.    
      
   Most web application firewalls ( WAF ) completely miss this attack, Wallarm   
   further warned, since the PUT request looks normal, the payload is   
   base64-encoded, the attack is two-step, where the harmful only happens in the   
   second step, and since most WAFs dont deeply inspect uploaded files.    
      
   This means that by the time an organization detects the breach in its logs,   
   its already too late.    
      
   The worst part, Wallarm concluded, is that this is just the first wave, as it   
   expects threat actors to start uploading malicious JSP files, modifying   
   configurations, and planting backdoors outside session storage.    
      
   It was not yet assigned a severity score, and as per the NVD, it affects   
   Apache Tomcat from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34,   
   and from 9.0.0.M1 through 9.0.98.    
      
   Users are advised to upgrade to version 11.0.3, 10.1.35 or 9.0.98, which    
   fixes the issue.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/a-worrying-critical-security-flaw-in-ap   
   ache-tomcat-could-let-hackers-take-over-servers-with-ease   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca