Sample exploit of patched vulnerability # CVE-2025-48799 – Apache Tomcat Remote Code Execution (PoC)
This repository contains a proof-of-concept exploit for CVE-2025-48799, a remote code execution vulnerability discovered in Apache Tomcat 9.0.48. The flaw stems from an integer overflow in the HTTP header parser, which can be triggered by a specially crafted `X-Forwarded` header.
---
## Purpose
This project was created for educational and research purposes only. It demonstrates:
* How malformed HTTP headers can lead to memory corruption
* Techniques for crafting shellcode and calculating buffer offsets
* A practical example of exploiting a real-world patched CVE in a controlled environment
---
## How It Works
The exploit:
1. Constructs an oversized `X-Forwarded` header to trigger an integer overflow
2. Injects shellcode into the corrupted memory region
3. Sends the payload using libcurl to a vulnerable Tomcat instance
---
## Ethical Disclaimer
This code is intended strictly for educational use in lab environments. Do not deploy or test this exploit on systems you do not own or have explicit permission to audit. I support responsible disclosure and ethical hacking practices.
---
## Files
- `cve_2025-48799.c` – Main exploit code
- `.gitignore` – Keeps build artifacts out of version control
- `LICENSE` – MIT license for open use
- `README.md` – Project overview and usage guidelines
---
## Author
Created by Mark Mallia mrk336.
I’m passionate about cybersecurity, reverse engineering, and building tools that help us understand how systems break—and how to make them stronger.
If you're a recruiter or hiring manager, feel free to reach out via GitHub or LinkedIn. I'd love to bring this mindset to your team.
---
## Contact
- GitHub: [github.com/mrk336](https://github.com/mrk336)
- LinkedIn: https://www.linkedin.com/in/mark-anthony-mallia-14115561/
[4.0K] /data/pocs/b1e2436ab9e803b94555f1f80fee3eae79072996
├── [4.9K] exploit_tomcat_48799.c
├── [1.0K] LICENSE
└── [1.8K] README.md
0 directories, 3 files