TROYANOSYVIRUS
Voltar para CVEs

CVE-2017-12617

HIGHCISA KEV
8.1

Descricao

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Detalhes CVE

Pontuacao CVSS v3.18.1
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeHIGH
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado10/4/2017
Ultima modificacao4/21/2026
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorApache
ProdutoTomcat
Nome da vulnerabilidadeApache Tomcat Remote Code Execution Vulnerability
Data inclusao KEV2022-03-25
Prazo de remediacao2022-04-15
Uso em ransomwareUnknown

Produtos afetados

apache:tomcatcanonical:ubuntu_linuxdebian:debian_linuxnetapp:active_iq_unified_managernetapp:elementnetapp:oncommand_balancenetapp:oncommand_insightnetapp:oncommand_shiftnetapp:oncommand_workflow_automationnetapp:snapcenteroracle:agile_plmoracle:communications_instant_messaging_serveroracle:endeca_information_discovery_integratororacle:enterprise_manager_for_mysql_databaseoracle:financial_services_analytical_applications_infrastructureoracle:fmw_platformoracle:health_sciences_empirica_inspectionsoracle:hospitality_guest_accessoracle:instantis_enterprisetrackoracle:management_packoracle:micros_lucasoracle:micros_retail_xbri_loss_preventionoracle:mysql_enterprise_monitororacle:retail_advanced_inventory_planningoracle:retail_back_officeoracle:retail_central_officeoracle:retail_convenience_and_fuel_pos_softwareoracle:retail_eftlinkoracle:retail_insightsoracle:retail_invoice_matchingoracle:retail_order_brokeroracle:retail_order_management_systemoracle:retail_point-of-serviceoracle:retail_price_managementoracle:retail_returns_managementoracle:retail_store_inventory_managementoracle:retail_xstore_point_of_serviceoracle:transportation_managementoracle:tuxedo_system_and_applications_monitororacle:webcenter_sitesoracle:workload_managerredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_eus_compute_noderedhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_ibm_z_systems_eusredhat:enterprise_linux_for_power_big_endianredhat:enterprise_linux_for_power_big_endian_eusredhat:enterprise_linux_for_power_little_endianredhat:enterprise_linux_for_power_little_endian_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:fuseredhat:jboss_enterprise_application_platformredhat:jboss_enterprise_web_serverredhat:jboss_enterprise_web_server_text-only_advisories

Fraquezas (CWE)

CWE-434CWE-434

Referencias

https://usn.ubuntu.com/3665-1/(security@apache.org)
http://www.securityfocus.com/bid/100954(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1039552(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3080(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3081(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3113(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3114(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0268(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0269(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0270(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0271(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0275(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0465(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0466(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2939(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20171018-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20180117-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K53173544(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3665-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/42966/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/43008/(af854a3a-2127-422b-91ae-364da2661108)

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.