VID |
22811 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of Apache Tomcat installed on the remote host is 7.0.x prior to 7.0.81. It is, therefore, affected by multiple vulnerabilities :
- An unspecified vulnerability when running on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialization parameter of the Default to false) makes it possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. (CVE-2017-12615, CVE-2017-12617)
- When using a VirtualDirContext it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request. (CVE-2017-12616)
* References: http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81
* Platforms Affected: Apache Tomcat Server versions 7.0.x prior to 7.0.81 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (7.0.81 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2017-12615,CVE-2017-12616 (CVE) |
Related URL |
100954 (SecurityFocus) |
Related URL |
(ISS) |
|