{"uuid": "b98c6da3-3b0f-4162-98f5-fdd1aeda5e07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-0232", "type": "published-proof-of-concept", "source": "https://t.me/ExcreamOnSecurity/99", "content": "Remote Code Execution (RCE) in CGI Servlet \u2013 Apache Tomcat on Windows \u2013 CVE-2019-0232\n\nApache Tomcat has a vulnerability in the CGI Servlet which can be exploited to achieve remote code execution (RCE). This is only exploitable when running on Windows in a non-default configuration in conjunction with batch files.\nThe vendor released a fix in Tomcat versions 7.0.94, 8.5.40 and 9.0.19. Users are encouraged to upgrade as soon as possible. CVE-2019-0232 has been assigned to track this issue.\n\nhttps://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232/\n\n#exploit #apache #tomcat #rce", "creation_timestamp": "2019-05-01T22:47:08.000000Z"}