The Tomcat-CVE-2024-50379-PoC is a proof-of-concept tool designed to demonstrate the exploitation of a critical vulnerability in Apache Tomcat, identified as CVE-2024-50379.
This vulnerability, with a CVSS score of 9.8, arises from a Time-of-check Time-of-use (TOCTOU) race condition during JavaServer Pages (JSP) compilation.
Under specific configurations, this flaw can lead to Remote Code Execution (RCE), posing significant risks to systems running vulnerable versions of Apache Tomcat.
CVE-2024-50379 exploits a race condition in case-insensitive file systems (e.g., Windows). The vulnerability occurs when:
file.jsp
vs. FILE.JSP
) during this narrow time window.For exploitation, the default servlet must be configured to allow write operations—a non-default setting.
The PoC script simulates this attack by automating the exploitation process. It enables users to:
To run the PoC:
go run main.go -u http://localhost:8080/
Replace http://localhost:8080/
with the target URL.
Features:
Limitations:
To secure systems against CVE-2024-50379:
This PoC serves as an educational tool for understanding and addressing critical vulnerabilities in Apache Tomcat environments.
It should only be used for legitimate security research and testing purposes, as unauthorized use is illegal and unethical.
BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and…
ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows…
Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability.…
Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They…
FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained…
Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool,…