Administration and Deployment

Installing and maintaining your SAS environment
BookmarkSubscribeRSS Feed
ghassanzghaib
Obsidian | Level 7

Hi,

 

Is the recent Apache Tomcat vulnerability "CVE-2025-24813" addressed by SAS?

I didn't find anything related to this vulnerability in the SAS Security Bulletins.

 

Thanks.

7 REPLIES 7
LinusH
Tourmaline | Level 20

Since this is a question directly to the vendor, I suggest that you open a track to tech support or contact your accont responsible.

Data never sleeps
ghassanzghaib
Obsidian | Level 7

Hi,

 

Apparently the installation is vulnerable only if the "readonly" parameter in the Tomcat's "web.xml" is changed to "false" from it's default value of "true".

 

 

Is our Tomcat susceptible to CVE-2025-24813?

 Solution Verified - Updated March 21 2025 at 3:15 PM - 

English 

Environment

  • JBoss Web Server
    • 5.x
    • 6.
  • Red Hat Enterprise Linux
    • 8.x
    • 9.x
    • 10.x
  • Red Hat Satellite
  • Red Hat Identity Management
  • Tomcat
    • 9.0.x
    • 10.1.x

Issue

  • Security reports are raising concerns about CVE-2025-24813 for our Tomcat version and requesting we upgrade. Are we truly susceptible?

Resolution

  • The impact of this vulnerability is heavily limited to non-default configurations that are not typically used.
  • If the readonly flag of the DefaultServlet on theweb.xml is not changed to false (its default of true is safe), then there is no impact. That would have to be added in a block like below of the tomcat or a webapp's web.xml:

Raw

    <servlet>

        <servlet-name>default</servlet-name>

        <servlet-class>org.apache.catalina.servlets.DefaultServlet</servlet-class>

        <init-param>

            <param-name>debug</param-name>

            <param-value>0</param-value>

        </init-param>

        <init-param>

            <param-name>listings</param-name>

            <param-value>false</param-value>

        </init-param>

        <init-param>

            <param-name>readonly</param-name>

            <param-value>false</param-value>

        </init-param>

        <load-on-startup>1</load-on-startup>

    </servlet>

  • If installed from a RHEL tomcat package, you could use a simple check like below to see if there is any line added to change the parameter at all:

Raw

$ grep readonly /etc/tomcat/web.xml | grep -v "<\!--"

  • Or if a JWS zip install:
    line added to change the parameter at all:

Raw

$ grep readonly /path/to/JWS_HOME/tomcat/conf/web.xml | grep -v "<\!--"

  • You may also check any deployed custom apps and their WEB-INF/web.xml for any modifications of their own:

Raw

$ grep readonly /path/to/webappname/WEB-INF/web.xml | grep -v "<\!--"

DJWanna
Obsidian | Level 7
quick verification ... this is the block that should be changed:
<servlet>
<servlet-name>default</servlet-name>
<servlet-class>org.apache.catalina.servlets.DefaultServlet</servlet-class>
<init-param>
<param-name>debug</param-name>
<param-value>0</param-value>
</init-param>
<init-param>
<param-name>listings</param-name>
<param-value>false</param-value>
</init-param>
<load-on-startup>1</load-on-startup>
</servlet>
And as it is now our web server IS vulnerable. Is this to be changed on all web.xml files?
ghassanzghaib
Obsidian | Level 7

Your block is missing the 'readonly' parameter but if you look at the comments somewhere above in the file you'll find the following:

 

<!-- readonly Is this context "read only", so HTTP -->

<!-- commands like PUT and DELETE are -->

<!-- rejected? [true] -->

 

[true] is the default value so you should be ok.

 

You only need to change the file in:  \SASConfig\Lev1\Web\WebAppServer\SASServer1_1\conf

DJWanna
Obsidian | Level 7
Sorry, follow-up question ... would we need to do a rebuild/redeploy of all the web applications? I see that web.xml is in all of the apps.
ghassanzghaib
Obsidian | Level 7

Since the parameter is not modified and it already has the default value of "true" you don't have to change anything.

 

 

UtkarshGupta
SAS Employee

As already mentioned earlier, please report this to SAS Support and further assistance can then be provided. Thanks.

suga badge.PNGThe SAS Users Group for Administrators (SUGA) is open to all SAS administrators and architects who install, update, manage or maintain a SAS deployment. 

Join SUGA 

Get Started with SAS Information Catalog in SAS Viya

SAS technical trainer Erin Winters shows you how to explore assets, create new data discovery agents, schedule data discovery agents, and much more.

Find more tutorials on the SAS Users YouTube channel.

Discussion stats
  • 7 replies
  • 1007 views
  • 1 like
  • 4 in conversation