# CVE-2025-31650
π¨ Proof of Concept (PoC) for Apache Tomcat HTTP/2 DoS vulnerability (CVE-2025-31650)
This script triggers a memory exhaustion condition in Apache Tomcat by sending malformed `priority` headers over HTTP/2.
---
## π― Affected Versions
- Apache Tomcat 9.0.76 β 9.0.102
- Apache Tomcat 10.1.10 β 10.1.39
- Apache Tomcat 11.0.0-M2 β 11.0.5
---
## βοΈ Features
- βοΈ HTTP/2 support verification
- βοΈ `Server` header inspection (detect Tomcat)
- βοΈ `--check-only` mode (non-intrusive)
- βοΈ Async-based scalable exploit with adjustable intensity
---
## π Usage
### β
Check-only (safe detection)
```bash
python3 PoC.py --target https://example.com:8443 --check-only
```
### π₯ Exploit (DoS)
```bash
python3 PoC.py --target https://example.com:8443 --exploit --tasks 50 --requests 5000
```
---
## π§© Arguments
| Parameter | Description |
|-------------------|-------------------------------------------------------|
| `--target` | Full target URL with protocol and port |
| `--check-only` | Only test if the server supports HTTP/2 & Tomcat |
| `--exploit` | Run the actual DoS attack |
| `--tasks` | Number of async tasks (default: 50) |
| `--requests` | Requests per task (default: 5000) |
---
## β οΈ Disclaimer
This PoC is for educational and authorized security testing **only**.
Do **not** use it against systems without explicit permission.
---
[4.0K] /data/pocs/605c87004a1fbd7390fc618b3e95688082a70839
βββ [6.8K] PoC.py
βββ [1.5K] README.md
0 directories, 2 files