FixVibe

// código / holofote

Apache Tomcat Coyote Resource-Shutdown Advisory

An affected Tomcat HTTP/2 runtime can turn reset behavior into resource exhaustion.

A pegada

Tomcat often reaches production through a framework parent, a BOM, an embedded servlet container, or a base image rather than a single obvious dependency line. CVE-2025-48989 is an HTTP/2 denial-of-service advisory; FixVibe treats a repo match as dependency evidence, not proof that HTTP/2 is enabled or reachable on the deployed service.

Como funciona

The repo check looks for Tomcat Coyote and embedded-core Maven coordinates in Java build files. Exact declared versions produce the strongest signal; compatible manifest ranges are reported when they clearly allow an affected Tomcat release line. The finding stays scoped to dependency evidence and does not claim FixVibe sent HTTP/2 reset traffic.

O raio de impacto

If an affected Tomcat runtime is deployed with the vulnerable HTTP/2 path exposed, attackers may be able to drive resource exhaustion and denial of service. A repo match should trigger dependency-tree review, artifact rebuild, and runtime verification before anyone treats it as confirmed production exposure.

// what fixvibe checks

What FixVibe checks

FixVibe repo scans look for high-confidence security patterns and dependency risk in source context. Reports identify the affected area and recommended fix. For check-specific questions about exact detection heuristics, active payload details, or source-code rule patterns, contact support@fixvibe.app.

Defesas blindadas

Upgrade the active Tomcat release line to 9.0.108, 10.1.44, 11.0.10, or newer. Update direct Tomcat artifacts, BOMs, Spring Boot-managed versions, Gradle constraints, or container base images as needed, then rebuild and redeploy the actual WAR, JAR, or image.

// rode no seu próprio app

Continue publicando enquanto o FixVibe vigia.

O FixVibe pressiona a superfície pública do seu app do jeito que um atacante faria — sem agente, sem instalação, sem cartão. Continuamos pesquisando novos padrões de vulnerabilidade e transformando isso em checks práticos e fixes prontos para Cursor, Claude e Copilot.

Código fonte
58
testes nessa categoria
módulos
20
checks dedicados de código fonte
todo scan
397+
testes em todas as categorias
  • Grátis — sem cartão, sem instalação, sem ping de Slack
  • Só colar uma URL — a gente crawla, sonda e reporta
  • Achados classificados por severidade, deduplicados no sinal
  • Prompts de fix atuais, prontos para colar no Cursor, Claude, Copilot
Rodar um scan grátis

// checks atuais · fixes práticos · publique com confiança

Apache Tomcat Coyote Resource-Shutdown Advisory — Holofote de Vulnerabilidade | FixVibe · FixVibe