You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "This module exploits a Java deserialization vulnerability in Apache\n Tomcat's session restoration functionality that can be exploited with a partial HTTP PUT request to\n place an attacker controlled deserialization payload in the <tomcat_root_dir>/webapps/ROOT/ directory.\n\n For the exploit to succeed, writes must be enabled for the default servlet,\n and org.apache.catalina.session.PersistentManager must be configured to use\n org.apache.catalina.session.FileStore.\n\n Verified working on 10.1.16-1",
0 commit comments