Skip to content

Commit b85faf9

Browse files
committed
Update documentation
1 parent 3fa7fe6 commit b85faf9

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

documentation/modules/exploit/multi/http/tomcat_partial_put_deserialization.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
## Vulnerable Application
22
This module exploits a Java deserialization vulnerability in Apache Tomcat's session restoration functionality
3-
that can be exploited with a partial PUT to place an attacker controlled deserialization payload in the work directory.
4-
For the exploit to succeed, writes must be enabled for the default servlet, and `org.apache.catalina.session.PersistentManager` must be
5-
configured to use `org.apache.catalina.session.FileStore`.
3+
that can be exploited with a partial HTTP PUT request to place an attacker controlled deserialization payload in the
4+
<tomcat_root_dir>/webapps/ROOT/ directory. For the exploit to succeed, writes must be enabled for the default servlet,
5+
and `org.apache.catalina.session.PersistentManager` must be configured to use `org.apache.catalina.session.FileStore`.
66

77
## Setup
88
Download Ubuntu Server 24:

modules/exploits/multi/http/tomcat_partial_put_deserialization.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ def execute_command(cmd, _opts = {})
130130
def upload_payload(cmd)
131131
# Generate a random session id
132132
session_id = Rex::Text.rand_text_alpha(10)
133-
# Determine the shell
133+
# Determine the shell and register the payload for cleanup
134134
case target['Platform']
135135
when ['unix', 'linux']
136136
shell = 'bash'

0 commit comments

Comments
 (0)