[Forgot Password]
Login  Register Subscribe

23631

 
 

117687

 
 

98250

 
 

909

 
 

79198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2017-12617

Date: (C)2017-10-04   (M)2017-12-05 


When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS Score: 6.8Access Vector: NETWORK
Exploit Score: 8.6Access Complexity: MEDIUM
Impact Score: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL





Reference:
BID-100954
SECTRACK-1039552
EXPLOIT-DB-42966
EXPLOIT-DB-43008
RHSA-2017:3080
RHSA-2017:3081
RHSA-2017:3113
RHSA-2017:3114
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb@%3Cannounce.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20171018-0002/

CPE    115
cpe:/a:apache:tomcat:7.0.71
cpe:/a:apache:tomcat:7.0.70
cpe:/a:apache:tomcat:7.0.66
cpe:/a:apache:tomcat:7.0.68
...
CWE    1
CWE-434
OVAL    3
oval:org.secpod.oval:def:1600797
oval:org.secpod.oval:def:502188
oval:org.secpod.oval:def:502190

© 2013 SecPod Technologies