Apache Tomcat
Last updated
Last updated
Tomcat Manager Application is a Java-Based HTTP Web Server, that uses Web Application Archive (WAR) files. These files contain Java Servlets and JavaServer Pages(JSP) which add functionality to the application.
If an attacker gains attackers gains access to the Tomcat Manager Application due to default credentials tomcat:s3cret
or weak credentials, the attacker could gain RCE by uploading a malicious WAR file.
You can use Msfvenom to create your own .war file that contains a reverse shell.
Then, accessing /manager/html
you can deploy the WAR file, which once accessed you will obtain a reverse shell.
If the tomcat server is misconfigured or you have access to the tomcat service with localhost, you could deploy/undeploy a reverse shell without accessing the web interface.
When Apache Tomcat is used together with a reverse proxy, Tomcat will treat the sequence /..;/
as /../
allowing the attacker to access Tomcat resources that are not normally accessible via the reverse proxy mapping.
CVE-2020-1938 allows an unauthenticated attacker to read web application files from a vulnerable server through port 8009.
Use it as your last resource because you might block the account.