POC详情: b99449e4e71fbdd082e25c8e3dcab6815530dc9b

来源
关联漏洞
标题: Apache Tomcat 安全漏洞 (CVE-2017-12615)
描述:Apache Tomcat是美国阿帕奇(Apache)软件基金会下属的Jakarta项目的一款轻量级Web应用服务器,它主要用于开发和调试JSP程序,适用于中小型系统。 Apache Tomcat 7.0.0版本至7.0.79版本存在远程代码执行漏洞。当上述版本的Tomcat启用HTTP PUT请求方法时,远程攻击者可以构造恶意请求利用该漏洞向服务器上传包含任意代码执行的jsp文件,并被服务器执行该文件,导致攻击者可以执行任意代码。
描述
PoC environment and exploit for the Apache Tomcat on Windows Remote Code Execution Vulnerability
介绍
# CVE 2017-12615 Apache Tomcat Windows RCE
## ⚠️Warning
> This is a proof of concept environment and exploit for known CVEs, strictly for learning and educational purposes. 

> Do not use these scripts or techniques on systems you do not own or have explicit permission to test. Unauthorised access or exploitation of systems is illegal and unethical.

## 📃Description
This is a proof of concept environment and exploit for CVE 2017-12615. 

The vulnerability arises in Tomcat with the following factors:
1. Servlet context was configured to have `readonly=false`
2. `HTTP PUT` requests are allowed

As such attackers may send and thus upload a **JSP** file via PUT a request. Apache Tomcat will then execute the code and render the response, rendering it vulnerable to **remote code execution (RCE)**

## ✏️Usage 
### Setting up the environment
1. Install and set up [Docker](https://www.docker.com/get-started/) 
2. Run the following commands
```
docker compose build
docker compose up -d
```

### Using the exploit
1. Install requirements
```
pip install -r requirements.txt
```
2. Run the exploit
```
python CVE-2017-12615.py [TARGETIP:PORT]
```
If the exploit was successful, you may check if your file was uploaded by going to the target address at http://target-host/test.jsp or using `curl http://target-host:port/test.jsp`

### Additional Flags
You may choose to upload your own file by specifying the file location as such:
```
python CVE-2017-12615.py [TARGETIP:PORT] -f [file_path]
```
文件快照

[4.0K] /data/pocs/b99449e4e71fbdd082e25c8e3dcab6815530dc9b ├── [1.0K] CVE-2017-12615.py ├── [ 63] docker-compose.yml ├── [ 81] Dockerfile ├── [1.5K] README.md ├── [ 186] requirements.txt └── [ 544] web.xml 0 directories, 6 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。