More information regarding vulnerability can be found below:
https://nvd.nist.gov/vuln/detail/CVE-2025-24813
Is Tomcat, which is used by Applications Manager, vulnerable to CVE-2025-24813?
Applications Manager 9.5.x, 9.6.x
Applications Manager is not vulnerable to CVE-2025-24813.
Applications Manager 9.5.x ships Tomcat application along with the product. For version 9.5.x, Tomcat can be upgrade to a fixed version.
Applications Manager 9.6.0 uses embedded Tomcat in the Integrated Web Server, but the environment is vulnerable to CVE-2025-24813 ONLY when the following 4 prerequisites are true:
readonly parameter in conf/web.xml must be set to false (it's true by default)
HttpServlet servlet = new DefaultServlet();
servlet.addInitParameter("readonly", "false"); //explicitly enable write
tomcat.addServlet(ctx, "default", new DefaultServlet()); //add default servlet
ctx.addServletMappingDecoded("/", "default");
curl -X PUT http://amserver.example.net:8080/AMENGINE/classes/Options.properties -d "test"
We don't use file based session storage. In fact, we don't use sessions at all if APIs are not enabled. Even when APIs are enabled, the sessions are in memory.