National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2017-12617 Detail

Current Description

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Source:  MITRE
View Analysis Description

Severity



CVSS 3.x Severity and Metrics:

NIST CVSS score
NIST: NVD
Base Score: 8.1 HIGH
Vector:  CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/100954 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039552 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2018:0268
https://access.redhat.com/errata/RHSA-2018:0269
https://access.redhat.com/errata/RHSA-2018:0270
https://access.redhat.com/errata/RHSA-2018:0271
https://access.redhat.com/errata/RHSA-2018:0275
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:2939
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb@%3Cannounce.tomcat.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00009.html
https://security.netapp.com/advisory/ntap-20171018-0002/
https://security.netapp.com/advisory/ntap-20180117-0002/
https://support.f5.com/csp/article/K53173544
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03812en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://usn.ubuntu.com/3665-1/
https://www.exploit-db.com/exploits/42966/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/43008/ Exploit Third Party Advisory VDB Entry
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

Weakness Enumeration

CWE-ID CWE Name Source
CWE-434 Unrestricted Upload of File with Dangerous Type NIST  

Known Affected Software Configurations Switch to CPE 2.2

Configuration 1 ( hide )
 cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.5:beta:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.48:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.49:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.51:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.55:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.56:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.57:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.58:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.59:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.60:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.61:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.62:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.63:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.64:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.65:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.66:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.67:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.68:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.69:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.70:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.71:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.72:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.73:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.74:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.75:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.76:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.77:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.79:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.80:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:7.0.81:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.2:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.4:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.6:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.7:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.9:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.10:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.11:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.12:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.13:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.14:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.15:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.16:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:8.0.17:*:*:*:*:*:*:*
     Show Matching CPE(s)
Showing 100 of 175 CPE Match Criteria, view all CPEs here


Change History

22 change records found - show changes

Quick Info

CVE Dictionary Entry:
CVE-2017-12617
NVD Published Date:
10/03/2017
NVD Last Modified:
04/23/2019