Описание
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | windows only |
esm-apps/xenial | not-affected | windows only |
esm-infra-legacy/trusty | not-affected | windows only |
precise/esm | DNE | |
trusty | not-affected | windows only |
trusty/esm | not-affected | windows only |
upstream | needs-triage | |
vivid/ubuntu-core | DNE | |
xenial | not-affected | windows only |
zesty | not-affected | windows only |
Показывать по
6.8 Medium
CVSS2
8.1 High
CVSS3
Связанные уязвимости
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs e ...
When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server
6.8 Medium
CVSS2
8.1 High
CVSS3