Korean
<< Back
VID 22808
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of Apache Tomcat installed on the remote host is 9.0.0.M1 or later but prior to 9.0.1. It is, therefore, affected by an unspecified vulnerability when running with HTTP PUTs enabled (e.g. via setting the readonly initialization parameter of the Default to false) that makes it possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

* References:
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb@%3Cannounce.tomcat.apache.org%3E

* Platforms Affected:
Apache Tomcat Server versions 9.0.x prior to 9.0.1
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (9.0.1 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2017-12617 (CVE)
Related URL 100954 (SecurityFocus)
Related URL (ISS)