module

Apache Tomcat Manager Application Deployer Authenticated Code Execution

Disclosed
11/09/2009
Created
05/30/2018

Description

This module can be used to execute a payload on Apache Tomcat servers that
have an exposed "manager" application. The payload is uploaded as a WAR archive
containing a jsp application using a PUT request.

The manager application can also be abused using /manager/html/upload, but that
method is not implemented in this module.

NOTE: The compatible payload sets vary based on the selected target. For
example, you must select the Windows target to use native Windows payloads.

Author

jduck

Platform

Java,Linux,Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

    msf > use exploit/multi/http/tomcat_mgr_deploy
    msf /(y) > show actions
        ...actions...
    msf /(y) > set ACTION < action-name >
    msf /(y) > show options
        ...show and set options...
    msf /(y) > run
  
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.