Miggo Logo

CVE-2025-61795: Apache Tomcat Vulnerable to Improper Resource Shutdown or Release

N/A

CVSS Score

Basic Information

EPSS Score
0.11577%
Published
10/27/2025
Updated
10/28/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.tomcat:tomcatmaven>= 11.0.0-M1, < 11.0.1211.0.12
org.apache.tomcat:tomcatmaven>= 10.1.0-M1, < 10.1.4710.1.47
org.apache.tomcat:tomcatmaven>= 9.0.0.40, < 9.0.1109.0.110
org.apache.tomcat:tomcatmaven>= 8.5.60, <= 8.5.100
org.apache.tomcat:tomcat-catalinamaven>= 11.0.0-M1, < 11.0.1211.0.12
org.apache.tomcat:tomcat-catalinamaven>= 10.1.0-M1, < 10.1.4710.1.47
org.apache.tomcat:tomcat-catalinamaven>= 9.0.0.40, < 9.0.1109.0.110
org.apache.tomcat:tomcat-catalinamaven>= 8.5.60, <= 8.5.100
org.apache.tomcat.embed:tomcat-embed-coremaven>= 11.0.0-M1, < 11.0.1211.0.12
org.apache.tomcat.embed:tomcat-embed-coremaven>= 10.1.0-M1, < 10.1.4710.1.47
org.apache.tomcat.embed:tomcat-embed-coremaven>= 9.0.0.40, < 9.0.1109.0.110
org.apache.tomcat.embed:tomcat-embed-coremaven>= 8.5.60, <= 8.5.100

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability described is a failure to properly clean up resources (temporary files) after a failed multipart upload in Apache Tomcat. The provided commit patches directly address this issue. By analyzing the changes in the Request.java file across the supplied commits, it's clear that the parseParts method is the central point of the vulnerability. The original code lacked a mechanism to guarantee the cleanup of temporary files in case of an exception during the upload parsing process. The fix introduces a finally block to ensure that item.delete() is called on the temporary FileItem objects, regardless of whether the upload parsing was successful or not. Therefore, org.apache.catalina.connector.Request.parseParts is the specific function that contains the flawed logic and would be active during the exploitation of this Denial of Service vulnerability.

Vulnerable functions

org.apache.catalina.connector.Request.parseParts
java/org/apache/catalina/connector/Request.java
The `parseParts` function in `org.apache.catalina.connector.Request` is responsible for parsing multipart/form-data requests. The vulnerability lies in the fact that if an error occurs during the parsing of a multipart upload (e.g., exceeding file size limits), the temporary files created on disk for the uploaded parts were not immediately deleted. The cleanup was left to the Java garbage collector (GC). Under high load, new temporary files could be created faster than the GC could clean up the old ones, leading to disk space exhaustion and a Denial of Service (DoS). The `parseParts` function is the entry point for this vulnerable process and would be present in any stack trace related to the exploit.

WAF Protection Rules

WAF Rule

I* *n *rror o**urr** (in*lu*in* *x****in* limits) *urin* t** pro**ssin* o* * multip*rt uplo**, t*mpor*ry *opi*s o* t** uplo**** p*rts writt*n to *is* w*r* not *l**n** up imm**i*t*ly *ut l**t *or t** **r**** *oll**tion pro**ss to **l*t*. **p*n*in* on

Reasoning

T** vuln*r**ility **s*ri*** is * **ilur* to prop*rly *l**n up r*sour**s (t*mpor*ry *il*s) **t*r * **il** multip*rt uplo** in *p**** Tom**t. T** provi*** *ommit p*t***s *ir**tly ***r*ss t*is issu*. *y *n*lyzin* t** ***n**s in t** `R*qu*st.j*v*` *il* *