# Exploit Title: Apache Tomcat 9.0.0.M1 - Cross-Site Scripting (XSS) # Date: 05/21/2019 # Exploit Author: Central InfoSec # Version: Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39, and 7.0.0 to 7.0.93 # CVE : CVE-2019-0221 # Requirements: # SSI support must be enabled within Apache Tomcat. SSI support is not enabled by default. # A file (usually "*.shtml") with the "printenv" SSI directive must exist within the web application. # The file must be accessible. # Proof of Concept: # Install a Java Runtime Environment (JRE) # Download a vulnerable version of Tomcat and extract the contents # Modify line 19 of the conf\context.xml file to globally enable privileged context Context privileged="true"> # Modify conf\web.xml to enable the SSI Servlet as per the Apache Tomcat User Guide # Put the following code in "webapps/ROOT/ssi/printenv.shtml"
Echo: