Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Apache Tomcat Remote Code Execution on Windows | https://github.com/pyn3rd/CVE-2019-0232 | POC Details |
| 2 | Apache Tomcat Remote Code Execution on Windows - CGI-BIN | https://github.com/jas502n/CVE-2019-0232 | POC Details |
| 3 | None | https://github.com/cyy95/CVE-2019-0232-EXP | POC Details |
| 4 | CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42 | https://github.com/setrus/CVE-2019-0232 | POC Details |
| 5 | None | https://github.com/Nicoslo/Windows-exploitation-Apache-Tomcat-8.5.19-CVE-2019-0232- | POC Details |
| 6 | None | https://github.com/Nicoslo/Windows-Exploitation-Web-Server-Tomcat-8.5.39-CVE-2019-0232 | POC Details |
| 7 | Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE) | https://github.com/jaiguptanick/CVE-2019-0232 | POC Details |
| 8 | None | https://github.com/xsxtw/CVE-2019-0232 | POC Details |
| 9 | Hi this is a revised and enhanced code for CVE-2019-0232 | https://github.com/Dharan10/CVE-2019-0232 | POC Details |
| 10 | None | https://github.com/iumiro/CVE-2019-0232 | POC Details |
| 11 | None | https://github.com/k3Pn1c/CVE-2019-0232_tomcat_cgi_exploit | POC Details |
| 12 | None | https://github.com/0xD3vNu1l/CVE-2019-0232_tomcat_cgi_exploit | POC Details |
| 13 | None | https://github.com/x3m1Sec/CVE-2019-0232_tomcat_cgi_exploit | POC Details |
| 14 | When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https-//codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https-//web.archive.org/web/20161228144344/https-//blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/). | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-0232.yaml | POC Details |
| 15 | None | https://github.com/Jorge2Rubio/CVE-2019-0232 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet