NOMISEC-abrewer251/CVE-2020-1938_Ghostcat-PoC
NOMISEC WORKING POC
Exploit for CVE-2020-1938
- Apache Geode < 7.0.100 - Remote Code Execution
AI Analysis
This repository contains a Python-based exploit for CVE-2020-1938 (Ghostcat), which leverages the AJP protocol to read arbitrary files from vulnerable Apache Tomcat servers. The tool includes multi-threaded scanning, custom wordlist support, and JSP payload generation for post-exploitation.
Attack Type
info_leak
Complexity
moderate
Reliability
reliable
Click anywhere or press Esc to close