CVE-2017-12616
19.09.2017, 13:29
When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.Enginsight
| Vendor | Product | Version |
|---|---|---|
| apache | tomcat | 7.0.0 |
| apache | tomcat | 7.0.0:beta |
| apache | tomcat | 7.0.1 |
| apache | tomcat | 7.0.2 |
| apache | tomcat | 7.0.2:beta |
| apache | tomcat | 7.0.3 |
| apache | tomcat | 7.0.4 |
| apache | tomcat | 7.0.4:beta |
| apache | tomcat | 7.0.5 |
| apache | tomcat | 7.0.5:beta |
| apache | tomcat | 7.0.6 |
| apache | tomcat | 7.0.7 |
| apache | tomcat | 7.0.8 |
| apache | tomcat | 7.0.9 |
| apache | tomcat | 7.0.10 |
| apache | tomcat | 7.0.11 |
| apache | tomcat | 7.0.12 |
| apache | tomcat | 7.0.13 |
| apache | tomcat | 7.0.14 |
| apache | tomcat | 7.0.15 |
| apache | tomcat | 7.0.16 |
| apache | tomcat | 7.0.17 |
| apache | tomcat | 7.0.18 |
| apache | tomcat | 7.0.19 |
| apache | tomcat | 7.0.20 |
| apache | tomcat | 7.0.21 |
| apache | tomcat | 7.0.22 |
| apache | tomcat | 7.0.23 |
| apache | tomcat | 7.0.24 |
| apache | tomcat | 7.0.25 |
| apache | tomcat | 7.0.26 |
| apache | tomcat | 7.0.27 |
| apache | tomcat | 7.0.28 |
| apache | tomcat | 7.0.29 |
| apache | tomcat | 7.0.30 |
| apache | tomcat | 7.0.31 |
| apache | tomcat | 7.0.32 |
| apache | tomcat | 7.0.33 |
| apache | tomcat | 7.0.34 |
| apache | tomcat | 7.0.35 |
| apache | tomcat | 7.0.36 |
| apache | tomcat | 7.0.37 |
| apache | tomcat | 7.0.38 |
| apache | tomcat | 7.0.39 |
| apache | tomcat | 7.0.40 |
| apache | tomcat | 7.0.41 |
| apache | tomcat | 7.0.42 |
| apache | tomcat | 7.0.43 |
| apache | tomcat | 7.0.44 |
| apache | tomcat | 7.0.45 |
| apache | tomcat | 7.0.46 |
| apache | tomcat | 7.0.47 |
| apache | tomcat | 7.0.48 |
| apache | tomcat | 7.0.49 |
| apache | tomcat | 7.0.50 |
| apache | tomcat | 7.0.51 |
| apache | tomcat | 7.0.54 |
| apache | tomcat | 7.0.55 |
| apache | tomcat | 7.0.56 |
| apache | tomcat | 7.0.57 |
| apache | tomcat | 7.0.58 |
| apache | tomcat | 7.0.59 |
| apache | tomcat | 7.0.60 |
| apache | tomcat | 7.0.61 |
| apache | tomcat | 7.0.62 |
| apache | tomcat | 7.0.63 |
| apache | tomcat | 7.0.64 |
| apache | tomcat | 7.0.65 |
| apache | tomcat | 7.0.66 |
| apache | tomcat | 7.0.67 |
| apache | tomcat | 7.0.68 |
| apache | tomcat | 7.0.69 |
| apache | tomcat | 7.0.70 |
| apache | tomcat | 7.0.71 |
| apache | tomcat | 7.0.72 |
| apache | tomcat | 7.0.73 |
| apache | tomcat | 7.0.74 |
| apache | tomcat | 7.0.75 |
| apache | tomcat | 7.0.76 |
| apache | tomcat | 7.0.77 |
| apache | tomcat | 7.0.79 |
| apache | tomcat | 7.0.80 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| tomcat7 |
| ||||||||||||||||||||||||||||||||||||
| tomcat8 |
|
Common Weakness Enumeration
References