Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
NameCVE-2017-12617First vendor Publication2017-10-03
VendorCveLast vendor Modification2019-04-23

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score6.8Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12617

CWE : Common Weakness Enumeration

%idName
100 %CWE-434Unrestricted Upload of File with Dangerous Type (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application175

SAINT Exploits

DescriptionLink
Apache Tomcat PUT method JSP uploadMore info here

Snort® IPS/IDS

DateDescription
2017-11-09Apache Tomcat remote JSP file upload attempt
RuleID : 44531 - Revision : 3 - Type : SERVER-APACHE

Metasploit Database

idDescription
2017-10-03 Tomcat RCE via JSP Upload Bypass

Nessus® Vulnerability Scanner

DateDescription
2018-11-27Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZLSA-2017-3080.nasl - Type : ACT_GATHER_INFO
2018-01-17Name : A web application running on the remote host is affected by multiple vulnerab...
File : mysql_enterprise_monitor_4_0_2_5168.nasl - Type : ACT_GATHER_INFO
2018-01-15Name : The remote Fedora host is missing a security update.
File : fedora_2017-ebb76fc3c9.nasl - Type : ACT_GATHER_INFO
2017-12-04Name : An HTTP server running on the remote host is affected by a remote arbitrary f...
File : tomcat_put_jsp.nasl - Type : ACT_ATTACK
2017-11-27Name : The remote openSUSE host is missing a security update.
File : openSUSE-2017-1299.nasl - Type : ACT_GATHER_INFO
2017-11-13Name : The remote Fedora host is missing a security update.
File : fedora_2017-ef7c118dbc.nasl - Type : ACT_GATHER_INFO
2017-11-13Name : The remote Fedora host is missing a security update.
File : fedora_2017-f499ee7b12.nasl - Type : ACT_GATHER_INFO
2017-11-08Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-3113.nasl - Type : ACT_GATHER_INFO
2017-11-02Name : The remote Apache Tomcat server is affected by a code execution vulnerability.
File : tomcat_6_0_24.nasl - Type : ACT_GATHER_INFO
2017-11-01Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2017-1261.nasl - Type : ACT_GATHER_INFO
2017-11-01Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2017-1262.nasl - Type : ACT_GATHER_INFO
2017-10-31Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2017-3080.nasl - Type : ACT_GATHER_INFO
2017-10-31Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2017-3081.nasl - Type : ACT_GATHER_INFO
2017-10-31Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20171030_tomcat6_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2017-10-31Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20171030_tomcat_on_SL7_x.nasl - Type : ACT_GATHER_INFO
2017-10-30Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2017-3080.nasl - Type : ACT_GATHER_INFO
2017-10-30Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2017-3081.nasl - Type : ACT_GATHER_INFO
2017-10-30Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-3080.nasl - Type : ACT_GATHER_INFO
2017-10-30Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-3081.nasl - Type : ACT_GATHER_INFO
2017-10-27Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2017-913.nasl - Type : ACT_GATHER_INFO
2017-10-11Name : The remote Apache Tomcat server is affected by a code execution vulnerability.
File : tomcat_7_0_82.nasl - Type : ACT_GATHER_INFO
2017-10-09Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_c0dae63448204505850db1c975d0f67d.nasl - Type : ACT_GATHER_INFO
2017-10-06Name : The remote Apache Tomcat server is affected by a code execution vulnerability.
File : tomcat_8_0_47.nasl - Type : ACT_GATHER_INFO
2017-10-06Name : The remote Apache Tomcat server is affected by a code execution vulnerability.
File : tomcat_8_5_23.nasl - Type : ACT_GATHER_INFO
2017-10-06Name : The remote Apache Tomcat server is affected by a code execution vulnerability.
File : tomcat_9_0_1.nasl - Type : ACT_GATHER_INFO
2017-09-19Name : The remote Apache Tomcat server is affected by multiple vulnerabilities.
File : tomcat_7_0_81.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/100954
CONFIRM http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
https://security.netapp.com/advisory/ntap-20171018-0002/
https://security.netapp.com/advisory/ntap-20180117-0002/
https://support.f5.com/csp/article/K53173544
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr...
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr...
EXPLOIT-DB https://www.exploit-db.com/exploits/42966/
https://www.exploit-db.com/exploits/43008/
MISC https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
MLIST https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba...
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e21...
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338...
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f0...
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a02...
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3...
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba14...
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993...
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ff...
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a904...
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df...
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8b...
https://lists.debian.org/debian-lts-announce/2017/11/msg00009.html
REDHAT https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2018:0268
https://access.redhat.com/errata/RHSA-2018:0269
https://access.redhat.com/errata/RHSA-2018:0270
https://access.redhat.com/errata/RHSA-2018:0271
https://access.redhat.com/errata/RHSA-2018:0275
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:2939
SECTRACK http://www.securitytracker.com/id/1039552
UBUNTU https://usn.ubuntu.com/3665-1/

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
DateInformations
2019-04-24 05:18:55
  • Multiple Updates
2019-04-24 00:18:52
  • Multiple Updates
2019-04-15 21:18:59
  • Multiple Updates
2019-04-15 17:18:45
  • Multiple Updates
2019-03-26 00:18:50
  • Multiple Updates
2019-03-25 17:18:59
  • Multiple Updates
2019-03-21 21:19:12
  • Multiple Updates
2018-10-18 17:19:46
  • Multiple Updates
2018-07-19 09:19:09
  • Multiple Updates
2018-06-01 09:19:27
  • Multiple Updates
2018-05-10 09:19:35
  • Multiple Updates
2018-04-20 09:19:16
  • Multiple Updates
2018-03-09 09:19:03
  • Multiple Updates
2018-02-07 09:20:07
  • Multiple Updates
2018-02-05 13:21:33
  • Multiple Updates
2018-01-18 21:22:35
  • Multiple Updates
2017-12-05 13:24:05
  • Multiple Updates
2017-12-02 09:21:46
  • Multiple Updates
2017-11-28 13:23:45
  • Multiple Updates
2017-11-14 13:24:55
  • Multiple Updates
2017-11-11 13:25:41
  • Multiple Updates
2017-11-10 09:23:06
  • Multiple Updates
2017-11-09 13:25:12
  • Multiple Updates
2017-11-03 13:24:49
  • Multiple Updates
2017-11-02 13:25:26
  • Multiple Updates
2017-11-01 13:25:10
  • Multiple Updates
2017-10-31 13:25:29
  • Multiple Updates
2017-10-28 13:24:45
  • Multiple Updates
2017-10-23 17:23:33
  • Multiple Updates
2017-10-20 09:23:03
  • Multiple Updates
2017-10-19 09:23:59
  • Multiple Updates
2017-10-17 21:23:21
  • Multiple Updates
2017-10-12 13:34:41
  • Multiple Updates
2017-10-12 09:23:59
  • Multiple Updates
2017-10-10 13:24:32
  • Multiple Updates
2017-10-07 13:25:06
  • Multiple Updates
2017-10-05 09:23:12
  • Multiple Updates
2017-10-04 09:23:22
  • First insertion