Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xjgh-84hx-56c5

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

Unrestricted Upload of File with Dangerous Type Apache Tomcat

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Ссылки

Пакеты

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 9.0.0.M1, <= 9.0.0M27

9.0.1

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 8.5.0, <= 8.5.22

8.5.23

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 8.0.0RC1, <= 8.0.46

8.0.47

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 7.0.0, <= 7.0.81

7.0.82

EPSS

Процентиль: 100%
0.94394
Критический

8.1 High

CVSS3

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 8 лет назад

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
redhat
почти 8 лет назад

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
nvd
почти 8 лет назад

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
debian
почти 8 лет назад

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22 ...

CVSS3: 8.1
fstec
почти 8 лет назад

Уязвимость сервера приложений Apache Tomcat, связанная с отсутствием ограничений на загрузку файлов, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94394
Критический

8.1 High

CVSS3

Дефекты

CWE-434