Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-12615

Опубликовано: 19 сент. 2017
Источник: redhat
CVSS3: 8.1
EPSS Критический

Описание

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.

Отчет

This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.

Меры по смягчению последствий

Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context. Block HTTP methods that permit resource modification for untrusted users.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Data Grid 6jbosswebNot affected
Red Hat JBoss Data Virtualization 6jbosswebNot affected
Red Hat JBoss Enterprise Application Platform 6jbosswebNot affected
Red Hat JBoss Fuse 6jbosswebNot affected
Red Hat JBoss Operations Network 3jbosswebNot affected
Red Hat JBoss Portal 6jbosswebNot affected
Red Hat Software Collectionsrh-java-common-tomcatNot affected
Red Hat Enterprise Linux 6tomcat6FixedRHSA-2017:308030.10.2017
Red Hat Enterprise Linux 7tomcatFixedRHSA-2017:308130.10.2017
Red Hat JBoss Enterprise Web Server 2 for RHEL 6httpdFixedRHSA-2017:311302.11.2017

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1493220tomcat: Remote Code Execution via JSP Upload

EPSS

Процентиль: 100%
0.9436
Критический

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
nvd
почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
debian
почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs e ...

CVSS3: 8.1
github
больше 6 лет назад

When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server

oracle-oval
больше 7 лет назад

ELSA-2017-3081: tomcat security update (IMPORTANT)

EPSS

Процентиль: 100%
0.9436
Критический

8.1 High

CVSS3