[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Apache Tomcat - (bulletinoct2017)

ID: oval:org.secpod.oval:def:2101475Date: (C)2020-01-18   (M)2023-12-14
Class: PATCHFamily: unix




When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Platform:
Sun Solaris 11
Product:
web/java-servlet/tomcat-8
web/java-servlet/tomcat-8/tomcat-examples
web/java-servlet/tomcat-8/tomcat-admin
Reference:
bulletinoct2017
CVE-2017-12617
CVE    1
CVE-2017-12617
CPE    1
cpe:/o:oracle:solaris:11

© SecPod Technologies