Описание
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.
Отчет
This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.
Меры по смягчению последствий
Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context. Block HTTP methods that permit resource modification for untrusted users.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat JBoss Data Grid 6 | jbossweb | Not affected | ||
Red Hat JBoss Data Virtualization 6 | jbossweb | Not affected | ||
Red Hat JBoss Enterprise Application Platform 6 | jbossweb | Not affected | ||
Red Hat JBoss Fuse 6 | jbossweb | Not affected | ||
Red Hat JBoss Operations Network 3 | jbossweb | Not affected | ||
Red Hat JBoss Portal 6 | jbossweb | Not affected | ||
Red Hat Software Collections | rh-java-common-tomcat | Not affected | ||
Red Hat Enterprise Linux 6 | tomcat6 | Fixed | RHSA-2017:3080 | 30.10.2017 |
Red Hat Enterprise Linux 7 | tomcat | Fixed | RHSA-2017:3081 | 30.10.2017 |
Red Hat JBoss Enterprise Web Server 2 for RHEL 6 | httpd | Fixed | RHSA-2017:3113 | 02.11.2017 |
Показывать по
Дополнительная информация
Статус:
EPSS
8.1 High
CVSS3
Связанные уязвимости
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs e ...
When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server
EPSS
8.1 High
CVSS3