logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2017-12615

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2017-12615

Description:
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
Last updated date:
07/16/2024

Reports

alt

ACTIVELY EXPLOITED

Type:
exploitation
Confidence:
HIGH
Date of publishing:
03/17/2020
Reference url to background

https://web.archive.org/web/20200316234856/https://twitter.com/bad_packets/status/1239693959330287616

Type:
exploitation
Confidence:
HIGH
Date of publishing:
03/25/2022
Type:
exploit
Confidence:
HIGH
Date of publishing:
09/23/2017
Type:
exploit
Confidence:
HIGH
Date of publishing:
09/25/2017
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/06/2017
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/18/2017
Type:
exploit
Confidence:
HIGH
Date of publishing:
12/26/2017
Reference url to background

https://github.com/1337g/CVE-2017-12615

Type:
exploit
Confidence:
HIGH
Date of publishing:
06/26/2020
Reference url to background

https://www.secfree.com/article-399.html

Type:
exploit
Confidence:
HIGH
Date of publishing:
11/13/2022
Reference url to background

https://github.com/tpt11fb/AttackTomcat

Type:
exploit
Confidence:
HIGH
Date of publishing:
03/10/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/16/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/16/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
08/29/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
08/29/2024
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy