关联漏洞
标题:Apache Tomcat 资源管理错误漏洞 (CVE-2022-29885)Description:Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat存在资源管理错误漏洞。攻击者利用该漏洞通过 EncryptInterceptor 导致 Apache Tomcat 过载,从而触发拒绝服务。
Description
Apache Tomcat DoS (CVE-2022-29885) Exploit
介绍
# CVE-2022-29885 by 1vere$k
Apache Tomcat DoS (CVE-2022-29885) Exploit.
Denial of Service in EncryptInterceptor (Tomcat Cluster).
The target machine needs to start the `Cluster Nio Receiver`.
Sending a special TCP packet will cause a Denial of Service to the target.
Whether `EncryptInterceptor` is used or not, there is the possibility of denial of service vulnerability with condition:
the Tomcat cluster function is enabled and use `NioReceiver` for communication.
Any version of Tomcat will be affected. The only solution is to use a trusted network.
Safe config file `server.xml` contains
```
<Interceptor className="org.apache.catalina.tribes.group.interceptors.EncryptInterceptor"
encryptionAlgorithm="AES/CBC/PKCS5Padding"
encryptionKey="ANY_KEY(LENGTH:32)"/>
```
Every other config variation is unsafe.
## Usage
Application
```
1. git clone https://github.com/iveresk/CVE-2022-29885.git
2. cd CVE-2022-29885
3. go build -o /cve-2022-29885
4. ./cve-2022-29885 -t <target_url or file_name> [OPTIONAL] -s false -d false
- t - target URL or filename
- d - debug {true, false} flag which enables or disables logs
- s - safe and unsafe regime switcher. Default value is unsafe.
```
Docker with pre-defined 6340 ruzzian Apache Tomcat servers multiplies for the 10 most common Tomcat ports.
Default `Unsafe` mode is pre-setuped.
```
docker run -d masterroot/cve-2022-29885
```
Have fun with `ruzzland-terrorist-state` VoIP devices :D
## RUSSIAN WARSHIP GO FRAK YOURSELF!

## Contact
You are free to contact me via [Keybase](https://keybase.io/1veresk) for any details.
文件快照
[4.0K] /data/pocs/b9d9d8932032d8e1ebb743dbf2c7b33b32d98d81
├── [ 21K] cve-2022-29885.go
├── [ 440] Dockerfile
├── [ 31] go.mod
├── [1.0K] LICENSE
├── [ 28K] README.html
├── [1.6K] README.md
├── [2.1K] run-cve.go
└── [588K] rus-ship-go-fuck-yourself.jpeg
0 directories, 8 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。