POC详情: b1e2436ab9e803b94555f1f80fee3eae79072996

来源
关联漏洞
标题: Microsoft Windows Update 后置链接漏洞 (CVE-2025-48799)
描述:Microsoft Windows Update是美国微软(Microsoft)公司的一个程序更新服务。 Microsoft Windows Update存在后置链接漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 10
描述
Sample exploit of patched vulnerability 
介绍
# CVE-2025-48799 – Apache Tomcat Remote Code Execution (PoC)

This repository contains a proof-of-concept exploit for CVE-2025-48799, a remote code execution vulnerability discovered in Apache Tomcat 9.0.48. The flaw stems from an integer overflow in the HTTP header parser, which can be triggered by a specially crafted `X-Forwarded` header.

---

## Purpose

This project was created for educational and research purposes only. It demonstrates:
* How malformed HTTP headers can lead to memory corruption
* Techniques for crafting shellcode and calculating buffer offsets
* A practical example of exploiting a real-world patched CVE in a controlled environment

---

##  How It Works

The exploit:
1. Constructs an oversized `X-Forwarded` header to trigger an integer overflow
2. Injects shellcode into the corrupted memory region
3. Sends the payload using libcurl to a vulnerable Tomcat instance

---

## Ethical Disclaimer

This code is intended strictly for educational use in lab environments. Do not deploy or test this exploit on systems you do not own or have explicit permission to audit. I support responsible disclosure and ethical hacking practices.

---

## Files

- `cve_2025-48799.c` – Main exploit code
- `.gitignore` – Keeps build artifacts out of version control
- `LICENSE` – MIT license for open use
- `README.md` – Project overview and usage guidelines

---

## Author

Created by Mark Mallia mrk336.  
I’m passionate about cybersecurity, reverse engineering, and building tools that help us understand how systems break—and how to make them stronger.

If you're a recruiter or hiring manager, feel free to reach out via GitHub or LinkedIn. I'd love to bring this mindset to your team.

---

## Contact

- GitHub: [github.com/mrk336](https://github.com/mrk336)
- LinkedIn: https://www.linkedin.com/in/mark-anthony-mallia-14115561/
文件快照

[4.0K] /data/pocs/b1e2436ab9e803b94555f1f80fee3eae79072996 ├── [4.9K] exploit_tomcat_48799.c ├── [1.0K] LICENSE └── [1.8K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。