Summary
Apache Tomcat vulnerability CVE-2025-24813 may allow:
Information disclosure
Malicious content injection
Remote Code Execution (RCE)
Affected DataOps Versions: older than 2025.2.0.0
Our application ships with a bundled Tomcat under:
Linux:
/opt/datagaps/DataOpsServer/Windows:
C:\app\datagaps\DataOpsSuite\DataOpsServer\Containers: Contact support
✅ Risk Assessment for DataOps
DataOpsServer is not affected by the remote code execution path of this CVE because:
File-based session persistence is disabled (default).
File uploads and logs are handled by the application code, not by Tomcat’s
DefaultServlet.
However, to prevent any possibility of exploitation via PUT or Content-Range We can apply the following mitigations.
Mitigation Steps
1. Harden DefaultServlet Configuration
File:
Linux:
/opt/datagaps/DataOpsServer/conf/web.xmlWindows:
C:\app\datagaps\DataOpsSuite\DataOpsServer\conf\web.xml
Update the <servlet> block for default servlet as follows:
2. Disable Partial PUT Support
File:
Linux:
/opt/datagaps/DataOpsServer/conf/context.xmlWindows:
C:\app\datagaps\DataOpsSuite\DataOpsServer\conf\context.xml
Modify the <Context> Element to include:
3. Restart DataOpsServer