U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2017-12615

Change History

Modified Analysis by NIST 7/16/2024 1:58:22 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_web_server_text-only_advisories:-:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.5:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4_ppc64le:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6_ppc64le:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.7_ppc64le:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Changed CPE Configuration
AND
     OR
          *cpe:2.3:a:apache:tomcat:7.0:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.5:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.48:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.49:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.51:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.55:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.56:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.57:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.58:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.59:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.60:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.61:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.62:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.63:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.64:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.65:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.66:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.67:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.68:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.69:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.70:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.71:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.72:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.73:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.74:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.75:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.76:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.77:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.79:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
AND
     OR
          *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (including) 7.0.79
     OR
          cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Removed CVSS V3
NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Changed Reference Type
http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html No Types Assigned
http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html Exploit
Changed Reference Type
http://www.securityfocus.com/bid/100901 Third Party Advisory, VDB Entry
http://www.securityfocus.com/bid/100901 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1039392 Third Party Advisory, VDB Entry
http://www.securitytracker.com/id/1039392 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
https://access.redhat.com/errata/RHSA-2017:3080 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:3080 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2017:3081 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:3081 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2017:3113 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:3113 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2017:3114 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:3114 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2018:0465 No Types Assigned
https://access.redhat.com/errata/RHSA-2018:0465 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2018:0466 No Types Assigned
https://access.redhat.com/errata/RHSA-2018:0466 Third Party Advisory
Changed Reference Type
https://github.com/breaktoprotect/CVE-2017-12615 No Types Assigned
https://github.com/breaktoprotect/CVE-2017-12615 Exploit, Third Party Advisory
Changed Reference Type
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E Mailing List, Patch
Changed Reference Type
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E Mailing List, Patch
Changed Reference Type
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E Mailing List, Patch
Changed Reference Type
https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c%40%3Cannounce.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c%40%3Cannounce.tomcat.apache.org%3E Issue Tracking, Mailing List
Changed Reference Type
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E Mailing List
Changed Reference Type
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E Mailing List, Patch
Changed Reference Type
https://security.netapp.com/advisory/ntap-20171018-0001/ No Types Assigned
https://security.netapp.com/advisory/ntap-20171018-0001/ Third Party Advisory
Changed Reference Type
https://www.exploit-db.com/exploits/42953/ No Types Assigned
https://www.exploit-db.com/exploits/42953/ Third Party Advisory, VDB Entry
Changed Reference Type
https://www.synology.com/support/security/Synology_SA_17_54_Tomcat No Types Assigned
https://www.synology.com/support/security/Synology_SA_17_54_Tomcat Third Party Advisory