### [CVE-2021-25329](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25329) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20Tomcat&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=Apache%20Tomcat%2010%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=Apache%20Tomcat%207%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=Apache%20Tomcat%208.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=Apache%20Tomcat%209%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20code%20execution%20via%20session%20persistence&color=brightgreen) ### Description The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue. ### POC #### Reference - https://www.oracle.com//security-alerts/cpujul2021.html - https://www.oracle.com/security-alerts/cpujan2022.html - https://www.oracle.com/security-alerts/cpuoct2021.html #### Github - https://github.com/0xb0rn3/r3cond0g - https://github.com/DNTYO/F5_Vulnerability - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh - https://github.com/Live-Hack-CVE/CVE-2021-25329 - https://github.com/bhagyahosur18/banking-app - https://github.com/dusbot/cpe2cve - https://github.com/m3n0sd0n4ld/uCVE - https://github.com/mklmfane/betvictor - https://github.com/raner/projo - https://github.com/versio-io/product-lifecycle-security-api - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough