vulnerability
Apache Tomcat: Important: Remote Code Execution (CVE-2017-12617)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | 10/03/2017 | 10/03/2017 | 04/25/2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
10/03/2017
Added
10/03/2017
Modified
04/25/2025
Description
When running with HTTP PUTs enabled (e.g. via setting the
readonly initialisation parameter of the Default servlet to
false) it was possible to upload a JSP file to the server via a specially
crafted request. This JSP could then be requested and any code it
contained would be executed by the server.
Solution(s)
apache-tomcat-upgrade-7_0_82apache-tomcat-upgrade-8_0_47apache-tomcat-upgrade-8_5_23apache-tomcat-upgrade-9_0_1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.