TROYANOSYVIRUS
Back to CVEs

CVE-2017-12617

HIGHCISA KEV
8.1

Description

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVE Details

CVSS v3.1 Score8.1
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredNONE
User InteractionNONE
Published10/4/2017
Last Modified4/21/2026
Sourcekev
Honeypot Sightings0

CISA KEV

VendorApache
ProductTomcat
Vulnerability NameApache Tomcat Remote Code Execution Vulnerability
KEV Date Added2022-03-25
Remediation Due Date2022-04-15
Ransomware UseUnknown

Affected Products

apache:tomcatcanonical:ubuntu_linuxdebian:debian_linuxnetapp:active_iq_unified_managernetapp:elementnetapp:oncommand_balancenetapp:oncommand_insightnetapp:oncommand_shiftnetapp:oncommand_workflow_automationnetapp:snapcenteroracle:agile_plmoracle:communications_instant_messaging_serveroracle:endeca_information_discovery_integratororacle:enterprise_manager_for_mysql_databaseoracle:financial_services_analytical_applications_infrastructureoracle:fmw_platformoracle:health_sciences_empirica_inspectionsoracle:hospitality_guest_accessoracle:instantis_enterprisetrackoracle:management_packoracle:micros_lucasoracle:micros_retail_xbri_loss_preventionoracle:mysql_enterprise_monitororacle:retail_advanced_inventory_planningoracle:retail_back_officeoracle:retail_central_officeoracle:retail_convenience_and_fuel_pos_softwareoracle:retail_eftlinkoracle:retail_insightsoracle:retail_invoice_matchingoracle:retail_order_brokeroracle:retail_order_management_systemoracle:retail_point-of-serviceoracle:retail_price_managementoracle:retail_returns_managementoracle:retail_store_inventory_managementoracle:retail_xstore_point_of_serviceoracle:transportation_managementoracle:tuxedo_system_and_applications_monitororacle:webcenter_sitesoracle:workload_managerredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_eus_compute_noderedhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_ibm_z_systems_eusredhat:enterprise_linux_for_power_big_endianredhat:enterprise_linux_for_power_big_endian_eusredhat:enterprise_linux_for_power_little_endianredhat:enterprise_linux_for_power_little_endian_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:fuseredhat:jboss_enterprise_application_platformredhat:jboss_enterprise_web_serverredhat:jboss_enterprise_web_server_text-only_advisories

Weaknesses (CWE)

CWE-434CWE-434

References

https://usn.ubuntu.com/3665-1/(security@apache.org)
http://www.securityfocus.com/bid/100954(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1039552(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3080(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3081(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3113(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3114(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0268(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0269(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0270(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0271(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0275(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0465(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0466(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2939(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20171018-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20180117-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K53173544(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3665-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/42966/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/43008/(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.