CVE-2017-12615

HIGH KEV RANSOMWARE NUCLEI

Apache Tomcat < 7.0.79 - Unrestricted File Upload

Title source: rule

Description

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Exploits (21)

nomisec WORKING POC 284 stars
by lizhianyuguangming · remote
https://github.com/lizhianyuguangming/TomcatScanPro
nomisec WORKING POC 250 stars
by tpt11fb · poc
https://github.com/tpt11fb/AttackTomcat
nomisec WORKING POC 111 stars
by breaktoprotect · remote
https://github.com/breaktoprotect/CVE-2017-12615
nomisec WORKING POC 11 stars
by mefulton · remote
https://github.com/mefulton/cve-2017-12615
nomisec WORKING POC 11 stars
by xiaokp7 · remote
https://github.com/xiaokp7/Tomcat_PUT_GUI_EXP
nomisec WORKING POC 5 stars
by zi0Black · remote
https://github.com/zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717
nomisec WORKING POC 3 stars
by 1337g · remote
https://github.com/1337g/CVE-2017-12615
nomisec WORKING POC 2 stars
by wsg00d · remote
https://github.com/wsg00d/cve-2017-12615
nomisec STUB 1 stars
by ianxtianxt · poc
https://github.com/ianxtianxt/CVE-2017-12615
github WORKING POC 1 stars
by vaishakhcv · perlpoc
https://github.com/vaishakhcv/CVE-exploits/tree/master/CVE-2017-12615_12617
nomisec WORKING POC 1 stars
by w0x68y · remote
https://github.com/w0x68y/CVE-2017-12615-EXP
nomisec WORKING POC 1 stars
by BeyondCy · poc
https://github.com/BeyondCy/CVE-2017-12615
nomisec WORKING POC
by edyekomu · poc
https://github.com/edyekomu/CVE-2017-12615-PoC
nomisec STUB
by cved-sources · poc
https://github.com/cved-sources/cve-2017-12615
github WORKING POC
by winterwolf32 · perlpoc
https://github.com/winterwolf32/CVE_Exploits-/tree/master/CVE-2017-12615_12617
nomisec WORKING POC
by cyberharsh · poc
https://github.com/cyberharsh/Tomcat-CVE-2017-12615
nomisec WORKING POC
by wudidwo · remote
https://github.com/wudidwo/CVE-2017-12615-poc
nomisec WORKING POC
by netw0rk7 · poc
https://github.com/netw0rk7/CVE-2017-12615-Home-Lab
nomisec WORKING POC
by Fa1c0n35 · poc
https://github.com/Fa1c0n35/CVE-2017-12615
exploitdb WORKING POC
by xxlegend · textwebappswindows
https://www.exploit-db.com/exploits/42953

Nuclei Templates (1)

Apache Tomcat Servers - Remote Code Execution
HIGHby pikpikcu
Shodan: title:"Apache Tomcat" || http.title:"apache tomcat" || http.html:"apache tomcat" || cpe:"cpe:2.3:a:apache:tomcat"
FOFA: body="apache tomcat" || title="apache tomcat"

References (20)

Scores

CVSS v3 8.1
EPSS 0.9422
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2022-03-25
VulnCheck KEV 2019-01-08
InTheWild.io 2020-03-17
ENISA EUVD EUVD-2018-0654
Ransomware Use Confirmed

Classification

CWE
CWE-434
Status draft

Affected Products (50)

apache/tomcat < 7.0.79
netapp/7-mode_transition_tool
netapp/oncommand_balance
netapp/oncommand_shift
redhat/enterprise_linux_server_update_services_for_sap_solutions
redhat/enterprise_linux_server_update_services_for_sap_solutions
redhat/enterprise_linux_server_update_services_for_sap_solutions
redhat/jboss_enterprise_web_server
redhat/jboss_enterprise_web_server
redhat/jboss_enterprise_web_server_text-only_advisories
redhat/enterprise_linux_desktop
redhat/enterprise_linux_desktop
redhat/enterprise_linux_eus
redhat/enterprise_linux_eus
redhat/enterprise_linux_eus
... and 35 more

Timeline

Published Sep 19, 2017
KEV Added Mar 25, 2022
Tracked Since Feb 18, 2026