vendor:
Tomcat
by:
Alphabot
8,1
CVSS
HIGH
Remote Code Execution
20
CWE
Product Name: Tomcat
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: CVE-2017-12615
CPE: a:apache:tomcat
Metasploit:
https://www.rapid7.com/db/vulnerabilities/apache-tomcat-cve-2017-12615/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2017-12615/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2017-12615/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2017-12615/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2017-12615/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2017-12615/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2017-12615/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2017-12615/
Other Scripts:
N/A
Tags: rce,tomcat,kev,vulhub,cve,cve2017,apache,fileupload,intrusive
CVSS Metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://github.com/vulhub/vulhub/tree/master/tomcat/CVE-2017-12615, https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c@announce.tomcat.apache.org, http://web.archive.org/web/20211206035549/https://securitytracker.com/id/1039392, https://nvd.nist.gov/vuln/detail/CVE-2017-12615, http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html
Nuclei Metadata: {'max-request': 2, 'shodan-query': 'title:"Apache Tomcat"', 'vendor': 'apache', 'product': 'tomcat'}
Platforms Tested: Windows
2017
Apache Tomcat RCE CVE-2017-12617
Apache Tomcat servers 7.0.{0 to 79} are susceptible to remote code execution. By design, you are not allowed to upload JSP files via the PUT method. This is likely a security measure to prevent an attacker from uploading a JSP shell and gaining remote code execution on the server. However, due to the insufficient checks, an attacker could gain remote code execution on Apache Tomcat servers that have enabled PUT method by using a specially crafted HTTP request.
Mitigation:
Disable HTTP PUTs on the server, or restrict access to the server to trusted users.