Skip to content

CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs).

Notifications You must be signed in to change notification settings

Alchemist3dot14/CVE-2024-50379

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2024-50379 Proof of Concept (PoC)

This repository contains a proof of concept (PoC) script to exploit CVE-2024-50379, a vulnerability in Apache Tomcat. The vulnerability is a Time-of-Check Time-of-Use (TOCTOU) race condition that can lead to remote code execution (RCE) if the server's configuration allows writable directories.


Features

  • Uploads a malicious JSP shell to the vulnerable Apache Tomcat server.
  • Executes arbitrary system commands via the uploaded shell.
  • Demonstrates the exploitation process for CVE-2024-50379.

Requirements

  • Python: Version 3.x
  • Python Libraries: requests
    • Install using:
      pip3 install requests

Usage

1. Setup Vulnerable Environment

Ensure you have a vulnerable version of Apache Tomcat (e.g., 10.1.33) configured with:

  • Writable /uploads directory.
  • An upload handler JSP file (upload.jsp).

2. Run the PoC Script

To run the script, use the following command:

python3 poc.py <command>

About

CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs).

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages