When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
Metrics
Affected Vendors & Products
References
History
Thu, 06 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Wed, 14 Aug 2024 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-06T21:00:56.156Z
Reserved: 2017-08-07T00:00:00.000Z
Link: CVE-2017-12615

Updated: 2024-08-05T18:43:56.420Z

Status : Modified
Published: 2017-09-19T13:29:00.190
Modified: 2025-02-06T21:15:09.480
Link: CVE-2017-12615
