Skip to content

Commit b132e3b

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent d16eeab commit b132e3b

File tree

1 file changed

+62
-0
lines changed

1 file changed

+62
-0
lines changed

db/modules_metadata_base.json

Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -103915,6 +103915,68 @@
103915103915
"session_types": false,
103916103916
"needs_cleanup": null
103917103917
},
103918+
"exploit_multi/http/tomcat_partial_put_deserialization": {
103919+
"name": "Tomcat Partial PUT Java Deserialization",
103920+
"fullname": "exploit/multi/http/tomcat_partial_put_deserialization",
103921+
"aliases": [],
103922+
"rank": 600,
103923+
"disclosure_date": "2025-03-10",
103924+
"type": "exploit",
103925+
"author": [
103926+
"sw0rd1ight",
103927+
"Calum Hutton",
103928+
"h4ck3r-04"
103929+
],
103930+
"description": "This module exploits a Java deserialization vulnerability in Apache\n Tomcat's session restoration functionality that can be exploited with a partial HTTP PUT request to\n place an attacker controlled deserialization payload in the <tomcat_root_dir>/webapps/ROOT/ directory.\n\n For the exploit to succeed, writes must be enabled for the default servlet,\n and org.apache.catalina.session.PersistentManager must be configured to use\n org.apache.catalina.session.FileStore.\n\n Verified working on 10.1.16-1",
103931+
"references": [
103932+
"CVE-2025-24813",
103933+
"URL-https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq",
103934+
"URL-https://nvd.nist.gov/vuln/detail/CVE-2025-24813"
103935+
],
103936+
"platform": "Linux,Unix,Windows",
103937+
"arch": "cmd",
103938+
"rport": 443,
103939+
"autofilter_ports": [
103940+
80,
103941+
8080,
103942+
443,
103943+
8000,
103944+
8888,
103945+
8880,
103946+
8008,
103947+
3000,
103948+
8443
103949+
],
103950+
"autofilter_services": [
103951+
"http",
103952+
"https"
103953+
],
103954+
"targets": [
103955+
"Unix Command",
103956+
"Windows Command"
103957+
],
103958+
"mod_time": "2025-04-02 14:10:46 +0000",
103959+
"path": "/modules/exploits/multi/http/tomcat_partial_put_deserialization.rb",
103960+
"is_install_path": true,
103961+
"ref_name": "multi/http/tomcat_partial_put_deserialization",
103962+
"check": true,
103963+
"post_auth": false,
103964+
"default_credential": false,
103965+
"notes": {
103966+
"Stability": [
103967+
"crash-safe"
103968+
],
103969+
"Reliability": [
103970+
"repeatable-session"
103971+
],
103972+
"SideEffects": [
103973+
"ioc-in-logs",
103974+
"artifacts-on-disk"
103975+
]
103976+
},
103977+
"session_types": false,
103978+
"needs_cleanup": true
103979+
},
103918103980
"exploit_multi/http/torchserver_cve_2023_43654": {
103919103981
"name": "PyTorch Model Server Registration and Deserialization RCE",
103920103982
"fullname": "exploit/multi/http/torchserver_cve_2023_43654",

0 commit comments

Comments
 (0)