CVE-2017-12615

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
apacheCNA
---
---
CVEADP
---
---
CISA-ADPADP
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
apachetomcat
7.0.0 ≤
𝑥
≤ 7.0.79
netapp7-mode_transition_tool
-
netapponcommand_balance
-
netapponcommand_shift
-
redhatenterprise_linux_server_update_services_for_sap_solutions
7.4
redhatenterprise_linux_server_update_services_for_sap_solutions
7.6
redhatenterprise_linux_server_update_services_for_sap_solutions
7.7
redhatjboss_enterprise_web_server
2.0.0
redhatjboss_enterprise_web_server
3.0.0
redhatjboss_enterprise_web_server_text-only_advisories
-
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_eus
7.4
redhatenterprise_linux_eus
7.5
redhatenterprise_linux_eus
7.6
redhatenterprise_linux_eus
7.7
redhatenterprise_linux_eus_compute_node
7.4
redhatenterprise_linux_eus_compute_node
7.5
redhatenterprise_linux_eus_compute_node
7.6
redhatenterprise_linux_eus_compute_node
7.7
redhatenterprise_linux_for_ibm_z_systems
7.0_s390x:_s390x
redhatenterprise_linux_for_ibm_z_systems_eus
7.4_s390x:_s390x
redhatenterprise_linux_for_ibm_z_systems_eus
7.5_s390x:_s390x
redhatenterprise_linux_for_ibm_z_systems_eus
7.6_s390x:_s390x
redhatenterprise_linux_for_ibm_z_systems_eus
7.7_s390x:_s390x
redhatenterprise_linux_for_power_big_endian
7.0_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.4_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.5_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.6_ppc64:_ppc64
redhatenterprise_linux_for_power_big_endian_eus
7.7_ppc64:_ppc64
redhatenterprise_linux_for_power_little_endian
7.0_ppc64le:_ppc64le
redhatenterprise_linux_for_power_little_endian_eus
7.4_ppc64le:_ppc64le
redhatenterprise_linux_for_power_little_endian_eus
7.5_ppc64le:_ppc64le
redhatenterprise_linux_for_power_little_endian_eus
7.6_ppc64le:_ppc64le
redhatenterprise_linux_for_power_little_endian_eus
7.7_ppc64le:_ppc64le
redhatenterprise_linux_for_scientific_computing
7.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_aus
7.6
redhatenterprise_linux_server_aus
7.7
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
7.4_ppc64le:_ppc64le
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
7.6_ppc64le:_ppc64le
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
7.7_ppc64le:_ppc64le
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
9.2_ppc64le:_ppc64le
redhatenterprise_linux_server_tus
7.4
redhatenterprise_linux_server_tus
7.6
redhatenterprise_linux_server_tus
7.7
redhatenterprise_linux_workstation
6.0
redhatenterprise_linux_workstation
7.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tomcat7
zesty
not-affected
xenial
not-affected
trusty
not-affected
References