Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-13935 PoC — Apache Tomcat 安全漏洞

Source
Associated Vulnerability
Title:Apache Tomcat 安全漏洞 (CVE-2020-13935)
Description:The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.
Readme
# Exploit for WebSocket Vulnerability in Apache Tomcat (CVE-2020-13935)

In the corresponding [blog post](https://blog.redteam-pentesting.de/2020/websocket-vulnerability-tomcat/)
the analysis and exploitation of the vulnerability is explained in detail.

## Usage

Clone the repository, then build the `tcdos` binary. Run the program as follows to test
whether a particular WebSocket endpoint is vulnerable:

```
$ git clone https://github.com/RedTeamPentesting/CVE-2020-13935
$ cd CVE-2020-13935
$ go build
$ ./tcdos [WebSocket endpoint]
```
File Snapshot

[4.0K] /data/pocs/0039ddd728a57b14a176fd6952f5e9bffb979459 ├── [ 67] go.mod ├── [ 175] go.sum ├── [1.0K] LICENSE ├── [7.1K] main.go ├── [ 543] README.md └── [ 323] wsDemon.sh 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →