Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/admin/http/tomcat_ghostcat.md
Views: 11788
Vulnerable Application
Description
This module can be used to retrieve arbitrary files from anywhere in the web application, including the WEB-INF
and META-INF
directories and any other location that can be reached via ServletContext.getResourceAsStream()
on Apache Tomcat servers. It also allows the attacker to process any file in the web application as JSP.
Setup
Running within a docker container:
Verification Steps
Install the application and start it
Start msfconsole
Do:
use auxiliary/admin/http/tomcat_ghostcat
Do:
set RHOSTS [ip]
Do:
set RPORT [port]
Do:
set FILENAME [filename]
Do:
run
Options
FILENAME
The file you would like to retrieve from the target web application. Defaults to /WEB-INF/web.xml
AJP_PORT
The port on the target that is running the Apache JServ Protocol (AJP).