VID |
22809 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of Apache Tomcat installed on the remote host is 8.5.x prior to 8.5.23. It is, therefore, affected by an unspecified vulnerability when running with HTTP PUTs enabled (e.g. via setting the readonly initialization parameter of the Default to false) that makes it possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
* References: https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb@%3Cannounce.tomcat.apache.org%3E
* Platforms Affected: Apache Tomcat Server versions 8.5.x prior to 8.5.23 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (8.5.23 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2017-12617 (CVE) |
Related URL |
100954 (SecurityFocus) |
Related URL |
(ISS) |
|