-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2017-12615 (High) detected in tomcat-catalina-7.0.42.jar #95
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
Comments
mend-for-github-com
bot
added
the
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
label
Nov 19, 2019
1 task
This was referenced Dec 8, 2019
1 task
1 task
This was referenced Oct 19, 2020
This was referenced Jun 29, 2022
mend-for-github-com
bot
changed the title
CVE-2017-12615 (High) detected in tomcat-catalina-7.0.42.jar
CVE-2017-12615 (Medium) detected in tomcat-catalina-7.0.42.jar
Oct 12, 2022
This was referenced Dec 13, 2022
mend-for-github-com
bot
changed the title
CVE-2017-12615 (Medium) detected in tomcat-catalina-7.0.42.jar
CVE-2017-12615 (High) detected in tomcat-catalina-7.0.42.jar
Dec 25, 2022
This was referenced Mar 27, 2023
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
0 participants
CVE-2017-12615 - High Severity Vulnerability
Vulnerable Library - tomcat-catalina-7.0.42.jar
Tomcat Servlet Engine Core Classes and Standard implementations
Library home page: http://tomcat.apache.org/
Path to dependency file: /pom.xml
Path to vulnerable library: /repository/org/apache/tomcat/tomcat-catalina/7.0.42/tomcat-catalina-7.0.42.jar
Dependency Hierarchy:
Found in HEAD commit: 349fffeed7cf25f2cf5b8b6a05b5e4367130406e
Found in base branches: dev, master
Vulnerability Details
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
Publish Date: 2017-09-19
URL: CVE-2017-12615
CVSS 3 Score Details (8.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12615
Release Date: 2017-09-19
Fix Resolution: 7.0.81
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered: