Korean
<< Back
VID 22811
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of Apache Tomcat installed on the remote host is 7.0.x prior to 7.0.81. It is, therefore, affected by multiple vulnerabilities :

- An unspecified vulnerability when running on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialization parameter of the Default to false) makes it possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. (CVE-2017-12615, CVE-2017-12617)

- When using a VirtualDirContext it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request. (CVE-2017-12616)

* References:
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81

* Platforms Affected:
Apache Tomcat Server versions 7.0.x prior to 7.0.81
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (7.0.81 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2017-12615,CVE-2017-12616 (CVE)
Related URL 100954 (SecurityFocus)
Related URL (ISS)