POC详情: 50522062b217027f9165912b123511c930a1f30a

来源
关联漏洞
标题: Apache Tomcat 安全漏洞 (CVE-2025-48988)
描述:Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。用于实现对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat存在安全漏洞,该漏洞源于资源分配无限制或节流。以下版本受到影响:11.0.0-M1版本至11.0.7版本、10.1.0-M1版本至10.1.41版本和9.0.0.M1版本至9.0.105版本。
介绍
# CVE-2025-48988 & CVE-2025-48976
## About
This project runs a simple file upload endpoint with Tomcat 10.1.41 and a Jakarta Servlet.

The exploit runs, by default, 1000 parallelized multipart requests with 1000 parts and 50 headers by part, from 50 workers.

## Run POC
Build and run the Docker container:

```docker build -t poc-cve-2025-48988 .```

```docker run -p 8080:8080 poc-cve-2025-48988```

Launch the exploit:

```python3 exploit-cve-2025-48988.py```

Monitor container resource usage:

```docker stats```

You will observe a significant increase in CPU usage:
![Stats](screenshots/docker_stats_tomcat_10.1.41.png)

## Remediation
Change docker image in dockerfile from `tomcat:10.1.41-jdk17` to `tomcat:10.1.42-jdk17`

With its default configuration, Tomcat will now respond with a 500 status code and CPU usage will remain stable, as per [fix](https://github.com/apache/tomcat/commit/667ddd76e2a0e762f3a784d86f0d25e7fd7cdb86#diff-1c3529b11adf91d5683a4d5394264b2f71383677ff4fb07f30f3e70c11b8e585R488-R877) introduced in Tomcat 10.1.42.
文件快照

[4.0K] /data/pocs/50522062b217027f9165912b123511c930a1f30a ├── [ 833] dockerfile ├── [2.0K] exploit-cve-2025-48988.py ├── [1.0K] README.md ├── [4.0K] screenshots │   └── [ 14K] docker_stats_tomcat_10.1.41.png ├── [4.0K] src │   └── [1011] UploadServlet.java └── [4.0K] web └── [4.0K] WEB-INF └── [ 330] web.xml 4 directories, 6 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。