Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-12615

Опубликовано: 19 сент. 2017
Источник: debian
EPSS Критический

Описание

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat7not-affectedpackage

EPSS

Процентиль: 100%
0.9436
Критический

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
redhat
почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
nvd
почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
github
больше 6 лет назад

When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server

oracle-oval
больше 7 лет назад

ELSA-2017-3081: tomcat security update (IMPORTANT)

EPSS

Процентиль: 100%
0.9436
Критический