CVE-2019-0232

HIGH EXPLOITED NUCLEI

Apache Tomcat < 7.0.93 - OS Command Injection

Title source: rule

Description

When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).

Exploits (16)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/47073
nomisec WORKING POC 189 stars
by pyn3rd · remote
https://github.com/pyn3rd/CVE-2019-0232
nomisec WORKING POC 80 stars
by jas502n · remote
https://github.com/jas502n/CVE-2019-0232
nomisec WORKING POC 22 stars
by jaiguptanick · remote
https://github.com/jaiguptanick/CVE-2019-0232
nomisec WRITEUP 20 stars
by setrus · poc
https://github.com/setrus/CVE-2019-0232
nomisec WORKING POC 3 stars
by cyy95 · poc
https://github.com/cyy95/CVE-2019-0232-EXP
nomisec WORKING POC 1 stars
by Jorge2Rubio · remote
https://github.com/Jorge2Rubio/CVE-2019-0232
nomisec WORKING POC 1 stars
by Dharan10 · remote
https://github.com/Dharan10/CVE-2019-0232
github WORKING POC 1 stars
by Shockp · pythonpoc
https://github.com/Shockp/CVE-Exploits/tree/main/CVE-2019-0232 (Tomcat cgi)
nomisec NO CODE 1 stars
by Nicoslo · poc
https://github.com/Nicoslo/Windows-Exploitation-Web-Server-Tomcat-8.5.39-CVE-2019-0232
nomisec NO CODE 1 stars
by Nicoslo · poc
https://github.com/Nicoslo/Windows-exploitation-Apache-Tomcat-8.5.19-CVE-2019-0232-
nomisec WORKING POC
by r4vl1t0 · remote
https://github.com/r4vl1t0/CVE-2019-0232
nomisec WORKING POC
by x3m1Sec · remote
https://github.com/x3m1Sec/CVE-2019-0232_tomcat_cgi_exploit
nomisec WORKING POC
by xsxtw · poc
https://github.com/xsxtw/CVE-2019-0232
metasploit WORKING POC EXCELLENT
by Yakov Shafranovich, sinn3r · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/tomcat_cgi_cmdlineargs.rb

Nuclei Templates (1)

Apache Tomcat `CGIServlet` enableCmdLineArguments - Remote Code Execution
HIGHby DhiyaneshDk
Shodan: http.html:"apache tomcat" || http.title:"apache tomcat" || http.html:"jk status manager" || cpe:"cpe:2.3:a:apache:tomcat"
FOFA: body="jk status manager" || body="apache tomcat" || title="apache tomcat"

References (32)

... and 12 more

Scores

CVSS v3 8.1
EPSS 0.9405
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2021-04-12
CWE
CWE-78
Status published
Products (3)
apache/tomcat 9.0.0 milestone1 (26 CPE variants)
apache/tomcat 7.0.0 - 7.0.93
org.apache.tomcat.embed/tomcat-embed-core 9.0.0.M1 - 9.0.17Maven
Published Apr 15, 2019
Tracked Since Feb 18, 2026