Think you have a false positive on this rule?

Sid 1-44531

Message

SERVER-APACHE Apache Tomcat remote JSP file upload attempt

Summary

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Impact

CVSS base score 8.1 CVSS impact score 5.9 CVSS exploitability score 2.2 confidentialityImpact HIGH integrityImpact HIGH availabilityImpact HIGH

CVE-2017-12617:

CVSS base score 8.1

CVSS impact score 5.9

CVSS exploitability score 2.2

Confidentiality Impact HIGH

Integrity Impact HIGH

Availability Impact HIGH

Detailed information

Recommendation: Upgrade to the latest version of software and apply the appropriate vendor-supplied patches. Ensure your anti-malware software has up-to-date signatures. The internal host should be checked for potential compromise. CVE-2017-12617: When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Affected systems

  • apache tomcat 7.0.0
  • apache tomcat 7.0.1
  • apache tomcat 7.0.2
  • apache tomcat 7.0.3
  • apache tomcat 7.0.4
  • apache tomcat 7.0.5
  • apache tomcat 7.0.6
  • apache tomcat 7.0.7
  • apache tomcat 7.0.8
  • apache tomcat 7.0.9
  • apache tomcat 7.0.10
  • apache tomcat 7.0.11
  • apache tomcat 7.0.12
  • apache tomcat 7.0.13
  • apache tomcat 7.0.14
  • apache tomcat 7.0.15
  • apache tomcat 7.0.16
  • apache tomcat 7.0.17
  • apache tomcat 7.0.18
  • apache tomcat 7.0.19
  • apache tomcat 7.0.20
  • apache tomcat 7.0.21
  • apache tomcat 7.0.22
  • apache tomcat 7.0.23
  • apache tomcat 7.0.24
  • apache tomcat 7.0.25
  • apache tomcat 7.0.26
  • apache tomcat 7.0.27
  • apache tomcat 7.0.28
  • apache tomcat 7.0.29
  • apache tomcat 7.0.30
  • apache tomcat 7.0.31
  • apache tomcat 7.0.32
  • apache tomcat 7.0.33
  • apache tomcat 7.0.34
  • apache tomcat 7.0.35
  • apache tomcat 7.0.36
  • apache tomcat 7.0.37
  • apache tomcat 7.0.38
  • apache tomcat 7.0.39
  • apache tomcat 7.0.40
  • apache tomcat 7.0.41
  • apache tomcat 7.0.42
  • apache tomcat 7.0.43
  • apache tomcat 7.0.44
  • apache tomcat 7.0.45
  • apache tomcat 7.0.46
  • apache tomcat 7.0.47
  • apache tomcat 7.0.48
  • apache tomcat 7.0.49
  • apache tomcat 7.0.50
  • apache tomcat 7.0.51
  • apache tomcat 7.0.54
  • apache tomcat 7.0.55
  • apache tomcat 7.0.56
  • apache tomcat 7.0.57
  • apache tomcat 7.0.58
  • apache tomcat 7.0.59
  • apache tomcat 7.0.60
  • apache tomcat 7.0.61
  • apache tomcat 7.0.62
  • apache tomcat 7.0.63
  • apache tomcat 7.0.64
  • apache tomcat 7.0.65
  • apache tomcat 7.0.66
  • apache tomcat 7.0.67
  • apache tomcat 7.0.68
  • apache tomcat 7.0.69
  • apache tomcat 7.0.70
  • apache tomcat 7.0.71
  • apache tomcat 7.0.72
  • apache tomcat 7.0.73
  • apache tomcat 7.0.74
  • apache tomcat 7.0.75
  • apache tomcat 7.0.76
  • apache tomcat 7.0.77
  • apache tomcat 7.0.79
  • apache tomcat 7.0.80
  • apache tomcat 7.0.81
  • apache tomcat 8.0.0
  • apache tomcat 8.0.1
  • apache tomcat 8.0.2
  • apache tomcat 8.0.4
  • apache tomcat 8.0.6
  • apache tomcat 8.0.7
  • apache tomcat 8.0.9
  • apache tomcat 8.0.10
  • apache tomcat 8.0.11
  • apache tomcat 8.0.12
  • apache tomcat 8.0.13
  • apache tomcat 8.0.14
  • apache tomcat 8.0.15
  • apache tomcat 8.0.16
  • apache tomcat 8.0.17
  • apache tomcat 8.0.18
  • apache tomcat 8.0.19
  • apache tomcat 8.0.20
  • apache tomcat 8.0.21
  • apache tomcat 8.0.22
  • apache tomcat 8.0.23
  • apache tomcat 8.0.24
  • apache tomcat 8.0.25
  • apache tomcat 8.0.26
  • apache tomcat 8.0.27
  • apache tomcat 8.0.28
  • apache tomcat 8.0.29
  • apache tomcat 8.0.30
  • apache tomcat 8.0.31
  • apache tomcat 8.0.32
  • apache tomcat 8.0.33
  • apache tomcat 8.0.34
  • apache tomcat 8.0.35
  • apache tomcat 8.0.36
  • apache tomcat 8.0.37
  • apache tomcat 8.0.38
  • apache tomcat 8.0.39
  • apache tomcat 8.0.40
  • apache tomcat 8.0.41
  • apache tomcat 8.0.42
  • apache tomcat 8.0.43
  • apache tomcat 8.0.44
  • apache tomcat 8.0.45
  • apache tomcat 8.0.46
  • apache tomcat 8.5.0
  • apache tomcat 8.5.1
  • apache tomcat 8.5.2
  • apache tomcat 8.5.3
  • apache tomcat 8.5.4
  • apache tomcat 8.5.5
  • apache tomcat 8.5.6
  • apache tomcat 8.5.7
  • apache tomcat 8.5.8
  • apache tomcat 8.5.9
  • apache tomcat 8.5.10
  • apache tomcat 8.5.11
  • apache tomcat 8.5.12
  • apache tomcat 8.5.13
  • apache tomcat 8.5.14
  • apache tomcat 8.5.15
  • apache tomcat 8.5.16
  • apache tomcat 8.5.17
  • apache tomcat 8.5.18
  • apache tomcat 8.5.19
  • apache tomcat 8.5.20
  • apache tomcat 8.5.21
  • apache tomcat 8.5.22
  • apache tomcat 9.0.0

Ease of attack

CVE-2017-12617:

Access Vector

Access Complexity

Authentication

False positives

None known

False negatives

None known

Corrective action

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References

  • bz.apache.org/bugzilla/show_bug.cgi?id=61542