关联漏洞
标题:
Apache Tomcat 安全漏洞
(CVE-2025-31650)
描述:Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。用于实现对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat 9.0.76至9.0.102版本、10.1.10至10.1.39版本和11.0.0-M2至11.0.5版本存在安全漏洞,该漏洞源于对无效HTTP优先级标头的错误处理导致内存泄漏,可能导致拒绝服务。
介绍
# CVE-2025-31650
🚨 Proof of Concept (PoC) for Apache Tomcat HTTP/2 DoS vulnerability (CVE-2025-31650)
This script triggers a memory exhaustion condition in Apache Tomcat by sending malformed `priority` headers over HTTP/2.
---
## 🎯 Affected Versions
- Apache Tomcat 9.0.76 – 9.0.102
- Apache Tomcat 10.1.10 – 10.1.39
- Apache Tomcat 11.0.0-M2 – 11.0.5
---
## ⚙️ Features
- ✔️ HTTP/2 support verification
- ✔️ `Server` header inspection (detect Tomcat)
- ✔️ `--check-only` mode (non-intrusive)
- ✔️ Async-based scalable exploit with adjustable intensity
---
## 🚀 Usage
### ✅ Check-only (safe detection)
```bash
python3 PoC.py --target https://example.com:8443 --check-only
```
### 💥 Exploit (DoS)
```bash
python3 PoC.py --target https://example.com:8443 --exploit --tasks 50 --requests 5000
```
---
## 🧩 Arguments
| Parameter | Description |
|-------------------|-------------------------------------------------------|
| `--target` | Full target URL with protocol and port |
| `--check-only` | Only test if the server supports HTTP/2 & Tomcat |
| `--exploit` | Run the actual DoS attack |
| `--tasks` | Number of async tasks (default: 50) |
| `--requests` | Requests per task (default: 5000) |
---
## ⚠️ Disclaimer
This PoC is for educational and authorized security testing **only**.
Do **not** use it against systems without explicit permission.
---
文件快照
[4.0K] /data/pocs/605c87004a1fbd7390fc618b3e95688082a70839
├── [6.8K] PoC.py
└── [1.5K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。