{"id":26095,"date":"2025-03-21T09:00:00","date_gmt":"2025-03-21T09:00:00","guid":{"rendered":"https:\/\/twproject.com\/blog\/?p=26095"},"modified":"2025-03-21T09:47:42","modified_gmt":"2025-03-21T09:47:42","slug":"vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere","status":"publish","type":"post","link":"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/","title":{"rendered":"Vulnerabilit\u00e0 in Apache Tomcat &#8211; Cosa c&#8217;\u00e8 da sapere"},"content":{"rendered":"\n<p>Il 10 marzo 2025 \u00e8 stata resa nota una grave vulnerabilit\u00e0 presente in alcune versioni del web-server <strong>Tomcat<\/strong>, sviluppato da <strong>Apache Software Foundation<\/strong>. <\/p>\n\n\n\n<p>Questa vulnerabilit\u00e0 \u00e8 stata denominata <strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24813\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-24813<\/a><\/strong> e le versioni di Tomcat colpite sono:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>9.x<\/strong>, dalla versione 9.0.0-M1 alla 9.0.98<\/li><li><strong>10.x<\/strong>, dalla versione 10.1.0-M1 alla 10.1.34<\/li><li><strong>11.x<\/strong>, dalla versione 11.0.0-M1 alla 11.0.2<\/li><\/ul>\n\n\n\n<p><strong>Twproject<\/strong>, quando installato tramite il file eseguibile <a href=\"https:\/\/twproject.com\/it\/sul-tuo-server\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>scaricabile dal sito<\/strong><\/a>, utilizza Apache Tomcat nella sua versione 9.0.46, dunque <strong>potenzialmente affetta dal problema<\/strong>.<\/p>\n\n\n\n<div class=\"table-of-content\">\n<h5>INDICE<\/h5>\n<ul>\n<li><a href=\"#consiste\">In cosa consiste la vulnerabilit\u00e0 CVE-2025-24813<\/a><\/li>\n<li><a href=\"#sapere\">Cosa c&#8217;\u00e8 da sapere per gli utenti di Twproject<\/a><\/li>\n<li><a href=\"#conclusioni\">Conclusioni<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<p><a name=\"consiste\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">In cosa consiste la vulnerabilit\u00e0 CVE-2025-24813<\/h2>\n\n\n\n<p>Tale vulnerabilit\u00e0 consiste in una <strong>Remote Code Execution (RCE)<\/strong>, abbinata ad una Information disclosure. <\/p>\n\n\n\n<p>Ci\u00f2 significa che un potenziale utente malintenzionato sarebbe in grado di eseguire un codice arbitrario e dunque manomettere il sistema interessato.<\/p>\n\n\n\n<p>Come indicato nella <strong><a href=\"https:\/\/tomcat.apache.org\/security-9.html\" target=\"_blank\" rel=\"noreferrer noopener\">pagina delle vulnerabilit\u00e0<\/a><\/strong>, questa vulnerabilit\u00e0 \u00e8 pericolosa e sfruttabile per un attacco, solo nel caso in cui si verifichino cinque diverse condizioni.<\/p>\n\n\n\n<p>La principale tra queste condizioni \u00e8 che la DefaultServlet di Tomcat riporti \u201c<em>writes enabled for the default servlet (disabled by default)<\/em>\u201d: in altre parole la scrittura per la <em>servlet<\/em> deve essere <strong>abilitata esplicitamente<\/strong>, poich\u00e9 di default essa \u00e8 disabilitata.<\/p>\n\n\n\n<p>Anche nell\u2019installer standard di Twproject \u00e8 presente la <strong>disabilitazione di default<\/strong>, e dunque in questo caso il pericolo non sussiste.<\/p>\n\n\n\n<p><a name=\"sapere\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cosa c&#8217;\u00e8 da sapere per gli utenti di Twproject<\/h2>\n\n\n\n<p>Come abbiamo visto, per chi abbia installato Twproject senza aver applicato alcun cambiamento ai <strong>file di configurazione<\/strong> non vi \u00e8 alcun pericolo. <\/p>\n\n\n\n<p>Diverso \u00e8 il discorso per chi avesse installato Twproject utilizzando un <strong>proprio Apache Tomcat<\/strong> di una delle versioni coinvolte nella vulnerabilit\u00e0.<\/p>\n\n\n\n<p>Per accertarsi quindi di non avere esposto il proprio server ad un attacco \u00e8 buona pratica seguire quanto indicato di seguito.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">1. Identificare il file<\/h5>\n\n\n\n<p>La<em> <\/em>DefaultServlet \u00e8 implementata nella classe org.apache.catalina.servlets.DefaultServlet ed \u00e8 utilizzata per servire file statici o fornire il directory listing.<\/p>\n\n\n\n<p>La gestione delle sue propriet\u00e0 \u00e8 delegata al file <strong>web.xml<\/strong>, presente nella cartella <em>conf<\/em> di Tomcat (all\u2019interno della quale si trovano tutti i file di configurazione).<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2. Verificare la configurazione<\/h5>\n\n\n\n<p>La configurazione predefinita della DefaultServlet \u00e8 la seguente:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\n&amp;lt;servlet&gt;\n        &amp;lt;servlet-name&gt;default&amp;lt;\/servlet-name&gt;\n        &amp;lt;servlet-class&gt;org.apache.catalina.servlets.DefaultServlet&amp;lt;\/servlet-class&gt;\n        &amp;lt;init-param&gt;\n            &amp;lt;param-name&gt;debug&amp;lt;\/param-name&gt;\n            &amp;lt;param-value&gt;0&amp;lt;\/param-value&gt;\n        &amp;lt;\/init-param&gt;\n        &amp;lt;init-param&gt;\n            &amp;lt;param-name&gt;listings&amp;lt;\/param-name&gt;\n            &amp;lt;param-value&gt;false&amp;lt;\/param-value&gt;\n        &amp;lt;\/init-param&gt;\n        &amp;lt;load-on-startup&gt;1&amp;lt;\/load-on-startup&gt;\n    &amp;lt;\/servlet&gt;\n<\/pre><\/div>\n\n\n<p><\/p>\n\n\n\n<p>Il parametro che abilita la possibilit\u00e0 di scrittura sul server \u00e8 \u201c<strong>readonly<\/strong>\u201d con valore \u201c<strong>false<\/strong>\u201d.<\/p>\n\n\n\n<p>E dunque una configurazione che esponga il server ad <strong>attacchi malevoli<\/strong> dovrebbe essere la seguente:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\n    &amp;lt;init-param&gt;\n        &amp;lt;param-name&gt;readonly&amp;lt;\/param-name&gt;\n        &amp;lt;param-value&gt;false&amp;lt;\/param-value&gt;\n    &amp;lt;\/init-param&gt;\n<\/pre><\/div>\n\n\n<h5 class=\"wp-block-heading\">3. Intervenire se necessario<\/h5>\n\n\n\n<p>Qualora dunque il parametro sia stato specificato ed il suo valore sia \u201c<strong>false<\/strong>\u201d \u00e8 indispensabile impostarlo a \u201c<strong>true<\/strong>\u201d, per disabilitare la scrittura della DefaultServlet.<\/p>\n\n\n\n<p>In alternativa \u00e8 possibile aggiornare <strong>Apache Tomcat<\/strong> ad una versione diversa da quelle sopra elencate.<\/p>\n\n\n\n<p>Se invece il parametro non \u00e8 presente nel file <strong>non c&#8217;\u00e8 alcun problema<\/strong>: conta il valore di default!<\/p>\n\n\n\n<p><strong>N.B.<\/strong>: potrebbe esservi pi\u00f9 di un file web.xml, a seconda dell\u2019architettura del server, ed \u00e8 dunque bene controllarli tutti!<\/p>\n\n\n\n<p><a name=\"conclusioni\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusioni<\/h2>\n\n\n\n<p>Speriamo di aver fornito tutte le informazioni utili per tranquillizzare i nostri utenti e istruirli al meglio in caso fosse necessario intervenire. <\/p>\n\n\n\n<p>Se hai bisogno di maggiore supporto, non esitare a contattarci tramite i <strong><a href=\"https:\/\/twproject.com\/it\/contatti\/\" target=\"_blank\" rel=\"noreferrer noopener\">nostri canali<\/a><\/strong>.<\/p>\n\n\n\n<p>Per approfondire l&#8217;argomento:<\/p>\n\n\n\n<p><a href=\"https:\/\/tomcat.apache.org\/security-9.html\">https:\/\/tomcat.apache.org\/security-9.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24813\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24813<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cisecurity.org\/advisory\/a-vulnerability-in-apache-tomcat-could-allow-for-remote-code-execution_2025-027\">https:\/\/www.cisecurity.org\/advisory\/a-vulnerability-in-apache-tomcat-could-allow-for-remote-code-execution_2025-027<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Il 10 marzo 2025 \u00e8 stata resa nota una grave vulnerabilit\u00e0 presente in alcune versioni del web-server Tomcat, sviluppato da Apache Software Foundation. Questa vulnerabilit\u00e0 \u00e8 stata denominata CVE-2025-24813 e le versioni di Tomcat colpite sono: 9.x, dalla versione 9.0.0-M1 alla 9.0.98 10.x, dalla versione 10.1.0-M1 alla 10.1.34 11.x, dalla versione 11.0.0-M1 alla 11.0.2 Twproject, &hellip; <a href=\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/\" class=\"more-link\">Leggi tutto<span class=\"screen-reader-text\"> &#8220;Vulnerabilit\u00e0 in Apache Tomcat &#8211; Cosa c&#8217;\u00e8 da sapere&#8221;<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":26098,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_custom_body_class":"","_custom_post_class":"","footnotes":""},"categories":[41,225],"tags":[],"class_list":["post-26095","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-categorizzato","category-release"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerabilit\u00e0 in Apache Tomcat - Cosa c&#039;\u00e8 da sapere<\/title>\n<meta name=\"description\" content=\"Cosa devono sapere gli utenti di Twproject relativamente alla vulnerabilit\u00e0 riscontrata in Apache Tomcat: una rapida guida.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerabilit\u00e0 in Apache Tomcat - Cosa c&#039;\u00e8 da sapere\" \/>\n<meta property=\"og:description\" content=\"Cosa devono sapere gli utenti di Twproject relativamente alla vulnerabilit\u00e0 riscontrata in Apache Tomcat: una rapida guida.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/\" \/>\n<meta property=\"og:site_name\" content=\"Twproject Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-21T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-21T09:47:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2023\/08\/I-migliori-software-di-gestione-costi-di-progetto-del-2023.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1922\" \/>\n\t<meta property=\"og:image:height\" content=\"1282\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Silvia Randaccio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2023\/08\/I-migliori-software-di-gestione-costi-di-progetto-del-2023.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Silvia Randaccio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/\"},\"author\":{\"name\":\"Silvia Randaccio\",\"@id\":\"https:\/\/twproject.com\/blog\/#\/schema\/person\/147b698444bab9b2e3a7437d9fb25d27\"},\"headline\":\"Vulnerabilit\u00e0 in Apache Tomcat &#8211; Cosa c&#8217;\u00e8 da sapere\",\"datePublished\":\"2025-03-21T09:00:00+00:00\",\"dateModified\":\"2025-03-21T09:47:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/\"},\"wordCount\":519,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/twproject.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png\",\"articleSection\":[\"News\",\"News di prodotto\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/\",\"url\":\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/\",\"name\":\"Vulnerabilit\u00e0 in Apache Tomcat - Cosa c'\u00e8 da sapere\",\"isPartOf\":{\"@id\":\"https:\/\/twproject.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png\",\"datePublished\":\"2025-03-21T09:00:00+00:00\",\"dateModified\":\"2025-03-21T09:47:42+00:00\",\"description\":\"Cosa devono sapere gli utenti di Twproject relativamente alla vulnerabilit\u00e0 riscontrata in Apache Tomcat: una rapida guida.\",\"breadcrumb\":{\"@id\":\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#primaryimage\",\"url\":\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png\",\"contentUrl\":\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png\",\"width\":800,\"height\":500,\"caption\":\"vulnerabilit\u00e0 Apache Tomcat Twproject\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/twproject.com\/blog\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerabilit\u00e0 in Apache Tomcat &#8211; Cosa c&#8217;\u00e8 da sapere\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/twproject.com\/blog\/#website\",\"url\":\"https:\/\/twproject.com\/blog\/\",\"name\":\"Twproject Blog\",\"description\":\"Project management trends and insights. Latest Twproject news\",\"publisher\":{\"@id\":\"https:\/\/twproject.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/twproject.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/twproject.com\/blog\/#organization\",\"name\":\"Twproject - Project Management Software\",\"url\":\"https:\/\/twproject.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/twproject.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/twroject-logo-m.png\",\"contentUrl\":\"https:\/\/twproject.com\/blog\/wp-content\/uploads\/twroject-logo-m.png\",\"width\":331,\"height\":110,\"caption\":\"Twproject - Project Management Software\"},\"image\":{\"@id\":\"https:\/\/twproject.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/twproject.com\/blog\/#\/schema\/person\/147b698444bab9b2e3a7437d9fb25d27\",\"name\":\"Silvia Randaccio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/twproject.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bc4d8e5f48568bc086c341be304425a9d3f741f6ea8d5fd3e40680176927b09e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bc4d8e5f48568bc086c341be304425a9d3f741f6ea8d5fd3e40680176927b09e?s=96&d=mm&r=g\",\"caption\":\"Silvia Randaccio\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerabilit\u00e0 in Apache Tomcat - Cosa c'\u00e8 da sapere","description":"Cosa devono sapere gli utenti di Twproject relativamente alla vulnerabilit\u00e0 riscontrata in Apache Tomcat: una rapida guida.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/","og_locale":"it_IT","og_type":"article","og_title":"Vulnerabilit\u00e0 in Apache Tomcat - Cosa c'\u00e8 da sapere","og_description":"Cosa devono sapere gli utenti di Twproject relativamente alla vulnerabilit\u00e0 riscontrata in Apache Tomcat: una rapida guida.","og_url":"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/","og_site_name":"Twproject Blog","article_published_time":"2025-03-21T09:00:00+00:00","article_modified_time":"2025-03-21T09:47:42+00:00","og_image":[{"width":1922,"height":1282,"url":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2023\/08\/I-migliori-software-di-gestione-costi-di-progetto-del-2023.jpg","type":"image\/jpeg"}],"author":"Silvia Randaccio","twitter_card":"summary_large_image","twitter_image":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2023\/08\/I-migliori-software-di-gestione-costi-di-progetto-del-2023.jpg","twitter_misc":{"Scritto da":"Silvia Randaccio","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#article","isPartOf":{"@id":"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/"},"author":{"name":"Silvia Randaccio","@id":"https:\/\/twproject.com\/blog\/#\/schema\/person\/147b698444bab9b2e3a7437d9fb25d27"},"headline":"Vulnerabilit\u00e0 in Apache Tomcat &#8211; Cosa c&#8217;\u00e8 da sapere","datePublished":"2025-03-21T09:00:00+00:00","dateModified":"2025-03-21T09:47:42+00:00","mainEntityOfPage":{"@id":"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/"},"wordCount":519,"commentCount":0,"publisher":{"@id":"https:\/\/twproject.com\/blog\/#organization"},"image":{"@id":"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#primaryimage"},"thumbnailUrl":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png","articleSection":["News","News di prodotto"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/","url":"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/","name":"Vulnerabilit\u00e0 in Apache Tomcat - Cosa c'\u00e8 da sapere","isPartOf":{"@id":"https:\/\/twproject.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#primaryimage"},"image":{"@id":"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#primaryimage"},"thumbnailUrl":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png","datePublished":"2025-03-21T09:00:00+00:00","dateModified":"2025-03-21T09:47:42+00:00","description":"Cosa devono sapere gli utenti di Twproject relativamente alla vulnerabilit\u00e0 riscontrata in Apache Tomcat: una rapida guida.","breadcrumb":{"@id":"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#primaryimage","url":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png","contentUrl":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/2025\/04\/tw-on-premise-1.png","width":800,"height":500,"caption":"vulnerabilit\u00e0 Apache Tomcat Twproject"},{"@type":"BreadcrumbList","@id":"https:\/\/twproject.com\/blog\/it\/vulnerabilita-in-apache-tomcat-cosa-ce-da-sapere\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/twproject.com\/blog\/it\/"},{"@type":"ListItem","position":2,"name":"Vulnerabilit\u00e0 in Apache Tomcat &#8211; Cosa c&#8217;\u00e8 da sapere"}]},{"@type":"WebSite","@id":"https:\/\/twproject.com\/blog\/#website","url":"https:\/\/twproject.com\/blog\/","name":"Twproject Blog","description":"Project management trends and insights. Latest Twproject news","publisher":{"@id":"https:\/\/twproject.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/twproject.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/twproject.com\/blog\/#organization","name":"Twproject - Project Management Software","url":"https:\/\/twproject.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/twproject.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/twroject-logo-m.png","contentUrl":"https:\/\/twproject.com\/blog\/wp-content\/uploads\/twroject-logo-m.png","width":331,"height":110,"caption":"Twproject - Project Management Software"},"image":{"@id":"https:\/\/twproject.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/twproject.com\/blog\/#\/schema\/person\/147b698444bab9b2e3a7437d9fb25d27","name":"Silvia Randaccio","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/twproject.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bc4d8e5f48568bc086c341be304425a9d3f741f6ea8d5fd3e40680176927b09e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bc4d8e5f48568bc086c341be304425a9d3f741f6ea8d5fd3e40680176927b09e?s=96&d=mm&r=g","caption":"Silvia Randaccio"}}]}},"_links":{"self":[{"href":"https:\/\/twproject.com\/blog\/it\/wp-json\/wp\/v2\/posts\/26095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/twproject.com\/blog\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/twproject.com\/blog\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/twproject.com\/blog\/it\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/twproject.com\/blog\/it\/wp-json\/wp\/v2\/comments?post=26095"}],"version-history":[{"count":10,"href":"https:\/\/twproject.com\/blog\/it\/wp-json\/wp\/v2\/posts\/26095\/revisions"}],"predecessor-version":[{"id":26110,"href":"https:\/\/twproject.com\/blog\/it\/wp-json\/wp\/v2\/posts\/26095\/revisions\/26110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/twproject.com\/blog\/it\/wp-json\/wp\/v2\/media\/26098"}],"wp:attachment":[{"href":"https:\/\/twproject.com\/blog\/it\/wp-json\/wp\/v2\/media?parent=26095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/twproject.com\/blog\/it\/wp-json\/wp\/v2\/categories?post=26095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/twproject.com\/blog\/it\/wp-json\/wp\/v2\/tags?post=26095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}