Advertisement






Apache Tomcat Remote Exploit (PUT request) and Account Scanner

CVE Category Price Severity
CWE-287 Not specified High
Author Risk Exploitation Type Date
Not specified High Remote 2012-03-20
CPE
cpe:cpe:/a:apache:tomcat
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2012030150

Below is a copy:

ISOWAREZ RELEASE
By KINGCOPE - YEAR 2012

-== Apache Tomcat Remote Exploit and Account Scanner ==-

the modified pnscan scanner utility scans a range of IPs to find open apache tomcat servers by trying the following login access combinations:

tomcat:tomcat
password:password
admin:admin
admin:password
admin:<nopassword>
tomcat:<nopassword>

the included perl script can be used to unlock apache tomcat servers
remotely by using the collected login combinations.
it will retrieve either a root or SYSTEM reverse shell depending on
the operating system
or the equivalent of a reverse shell as the current user tomcat is running as.
the exploit might contain metasploit logic (thanks to jduck).

Enjoy :>

/Kingcope

http://www.youtube.com/watch?v=_0wgBHDv3UQ
We are waiting days and nights
for a wind to blow
in this land that has been burnt
and we never get relief

We are waiting days and nights
for the light of that day
that will bring to everyone
relief and an end to the pain, to the war, to the occupation


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum