Skip to content

CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.

License

Notifications You must be signed in to change notification settings

Mattb709/CVE-2025-24813-Scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2025-24813 Scanner

A multi-threaded vulnerability scanner to detect Apache Tomcat servers vulnerable to CVE-2025-24813 (arbitrary file upload leading to RCE).

Python Version License

Description

This scanner checks for Apache Tomcat servers vulnerable to CVE-2025-24813 by:

  1. Attempting to upload a serialized Java object via HTTP PUT
  2. Verifying if the uploaded file can be executed via jsessionid parameter

Features:

  • Multi-threaded scanning (adjustable thread count)
  • CSV input/output support
  • Color-coded terminal output
  • Detailed vulnerability verification
  • Graceful interruption handling

Installation

git clone https://github.com/mattb709/CVE-2025-24813-Scanner.git
cd CVE-2025-24813-Scanner
pip install -r requirements.txt

Usage

Basic Scan

python CVE-2025-24813-Scanner.py -f targets.csv

Full Options

python CVE-2025-24813-Scanner.py \
  -f targets.csv \          # Input CSV with host,ip,port columns
  -o vulnerable_hosts.csv \ # Save vulnerable targets
  -t 10 \                   # Use 10 threads

Example Scenarios

  1. Quick scan with default settings:
python CVE-2025-24813-Scanner.py -f network_hosts.csv
  1. Comprehensive scan with output:
python CVE-2025-24813-Scanner.py -f production.csv -o results.csv -t 15

Sample Output

[*] Apache Tomcat CVE-2025-24813 Scanner

[*] Scanning https://example.com:8443...
[+] https://example.com:8443 is vulnerable to CVE-2025-24813!

[*] Scanning http://testserver:8080...
[-] http://testserver:8080 is not vulnerable (PUT failed: 401).

[*] Scanning http://192.168.1.15:8080...
[!] http://192.168.1.15:8080 allows PUT but no RCE (GET: 404).

[*] Scan Complete
[+] Vulnerable: 1
[-] Not Vulnerable: 2
[+] Vulnerable IPs:
    https://example.com:8443

Requirements

  • Python 3.6+
  • Packages:
    • requests>=2.25.1
    • pandas>=1.2.0
    • colorama>=0.4.4

License

MIT License - See LICENSE for details.

Disclaimer

This tool is for authorized security testing and educational purposes only. Never scan systems without explicit permission. The author accepts no liability for misuse of this software.

About

CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages