This repository provides a controlled, automated environment to demonstrate Remote Code Execution (RCE) vulnerabilities in Apache Tomcat via CVE-2025-24813.
This PoC exploits misconfigured file-based session persistence in Apache
Tomcat's DefaultServlet to achieve unauthorized file overwrites.
- Docker and Docker Compose installed.
From the repository root, run:
docker compose up -d --buildFollow the automated tutorial workflow:
- Navigate to the
exploit/directory. - Activate the python virtual environment:
source venv/bin/activate - Follow the instructions in
./exploit/exploit_path.mdto execute the exploit.