Vulnerability Description
When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Tomcat | >= 7.0.0, < 7.0.82 |
| Canonical | Ubuntu Linux | 12.04 |
| Oracle | Agile Plm | 9.3.3 |
| Oracle | Communications Instant Messaging Server | 10.0.1 |
| Oracle | Endeca Information Discovery Integrator | 3.1.0 |
| Oracle | Enterprise Manager For Mysql Database | 12.1.0.4.0 |
| Oracle | Financial Services Analytical Applications Infrastructure | >= 7.3.3.0.0, <= 7.3.5.3.0 |
| Oracle | Fmw Platform | 12.2.1.2.0 |
| Oracle | Health Sciences Empirica Inspections | 1.0.1.1 |
| Oracle | Hospitality Guest Access | 4.2.0 |
| Oracle | Instantis Enterprisetrack | 17.1 |
| Oracle | Management Pack | 11.2.1.0.13 |
| Oracle | Micros Lucas | 2.9.5 |
| Oracle | Micros Retail Xbri Loss Prevention | 10.0.1 |
| Oracle | Mysql Enterprise Monitor | <= 3.3.6.3293 |
| Oracle | Retail Advanced Inventory Planning | 13.2 |
| Oracle | Retail Back Office | 14.0.4 |
| Oracle | Retail Central Office | 14.0.4 |
| Oracle | Retail Convenience And Fuel Pos Software | 2.1.132 |
| Oracle | Retail Eftlink | 1.1.124 |
Related Weaknesses (CWE)
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.htmlPatchThird Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlPatchThird Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlPatchThird Party Advisory
- http://www.securityfocus.com/bid/100954Third Party AdvisoryVDB EntryBroken Link
- http://www.securitytracker.com/id/1039552Third Party AdvisoryVDB EntryBroken Link
- https://access.redhat.com/errata/RHSA-2017:3080Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:3081Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:3113Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:3114Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0268Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0269Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0270Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0271Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0275Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0465Third Party Advisory
FAQ
What is CVE-2017-12617?
CVE-2017-12617 is a vulnerability with a CVSS score of 8.1 (HIGH). When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the De...
How severe is CVE-2017-12617?
CVE-2017-12617 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-12617?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Tomcat, Canonical Ubuntu Linux, Oracle Agile Plm, Oracle Communications Instant Messaging Server, Oracle Endeca Information Discovery Integrator.