Skip to content

drcrypterdotru/Apache-GOExploiter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🛠 Apache_GoExploiter – CVE-2025-24813 PUT Method Exploit Toolkit

Apache_GoExploiter is a Go-based proof-of-concept tool to scan and exploit Apache Tomcat servers vulnerable to CVE-2025-24813. It tests for exposed HTTP PUT support on port 8080 and attempts to upload test or shell files into writable directories.


📸 Demo

Preview
demo1
demo2

⚙️ Features

  • 🔍 Auto-detects http://<host>:8080 even from input like example.com or put http://example.com
  • ⚡ Multithreaded scan support (-threads)
  • ✍️ Tests for PUT support and writable directories
  • 🐚 Optional shell upload if directory is writable
  • 💾 Saves successful results to output files

🚀 How to Use

🧪 Option 1: Run via Go (no compile)

go run Apache_GoExploiter.go -list list.txt -threads 50

🔨 Option 2: Build & Run

🔹 Linux

go build -o Apache_GoExploiter Apache_GoExploiter.go
./Apache_GoExploiter -list list.txt -threads 50

🔹 Windows (PowerShell / CMD)

go build -o Apache_GoExploiter.exe Apache_GoExploiter.go
Apache_GoExploiter.exe -list list.txt -threads 50

📥 Input Format

Provide your target URLs in a file (e.g., list.txt). Format:

http://example.com
example.org

Do not include :8080 — the tool will add and test it automatically.


📂 Output Files

File Description
PUT_VULN.txt Targets that responded positively to HTTP PUT
Shelled.txt Targets where the uploaded shell file succeeded (writable path)

📦 Download

You can download binaries here or build from source using go build.


🧠 CVE Details – CVE-2025-24813

Apache Tomcat allows file uploads via the PUT method under certain misconfigured contexts (like WebDAV). If enabled:

  • Attacker may upload arbitrary files (like a JSP shell)
  • No authentication may be required
  • Writable directories may allow code execution

⚠️ Legal Warning

This tool is for educational and authorized security testing only.
Do not scan domains you do not own or lack permission to test.
Unauthorized use may be illegal and punishable under applicable laws.


✍️ Author

Developed by DRCrypter.ru
Telegram: @drcrypterd0tru
GitHub: @drcrypterdotru