ajp-ghostcat

Exploit Apache JServ Protocol (AJP) misconfigurations and Ghostcat (CVE-2020-1938) for file read and remote code execution on Apache Tomcat. Use when port 8009 is open or AJP connector is exposed.

by blacklanternsecurity· Repository·other
Also installable via skills CLI
npx skills add blacklanternsecurity/red-run/skills/web/ajp-ghostcat

Source

Path:skills/web/ajp-ghostcat/SKILL.md(main)

Related in other

ajp-ghostcat | AgentArea Skills