Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-12617

Опубликовано: 04 окт. 2017
Источник: ubuntu
Приоритет: high
EPSS Критический
CVSS2: 6.8
CVSS3: 8.1

Описание

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

РелизСтатусПримечание
artful

ignored

end of life
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

DNE

disco

DNE

eoan

DNE

esm-apps/bionic

ignored

see notes
esm-apps/xenial

released

7.0.68-1ubuntu0.4+esm3
esm-infra-legacy/trusty

not-affected

7.0.52-1ubuntu0.14
esm-infra/focal

DNE

Показывать по

РелизСтатусПримечание
artful

released

8.5.21-1ubuntu1.1
bionic

not-affected

8.5.30-1ubuntu1
cosmic

not-affected

8.5.30-1ubuntu2
devel

DNE

disco

DNE

eoan

DNE

esm-apps/bionic

not-affected

8.5.30-1ubuntu1
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

esm-infra/xenial

not-affected

8.0.32-1ubuntu1.6

Показывать по

РелизСтатусПримечание
artful

ignored

end of life
bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

Показывать по

EPSS

Процентиль: 100%
0.94394
Критический

6.8 Medium

CVSS2

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
redhat
больше 7 лет назад

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
nvd
больше 7 лет назад

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
debian
больше 7 лет назад

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22 ...

CVSS3: 8.1
github
около 3 лет назад

Unrestricted Upload of File with Dangerous Type Apache Tomcat

CVSS3: 8.1
fstec
больше 7 лет назад

Уязвимость сервера приложений Apache Tomcat, связанная с отсутствием ограничений на загрузку файлов, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94394
Критический

6.8 Medium

CVSS2

8.1 High

CVSS3