CVE-2017-12617

HIGH KEV NUCLEI

Apache Tomcat < 7.0.82 - Unrestricted File Upload

Title source: rule

Description

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Exploits (19)

nomisec WORKING POC 394 stars
by cyberheartmi9 · remote
https://github.com/cyberheartmi9/CVE-2017-12617
nomisec WORKING POC 3 stars
by LongWayHomie · remote
https://github.com/LongWayHomie/CVE-2017-12617
nomisec WORKING POC 2 stars
by ygouzerh · remote
https://github.com/ygouzerh/CVE-2017-12617
github WORKING POC 1 stars
by vaishakhcv · perlpoc
https://github.com/vaishakhcv/CVE-exploits/tree/master/CVE-2017-12617
nomisec WORKING POC 1 stars
by jptr218 · remote
https://github.com/jptr218/tc_hack
nomisec WORKING POC 1 stars
by tyranteye666 · remote
https://github.com/tyranteye666/tomcat-cve-2017-12617
nomisec WORKING POC
by devcoinfet · remote
https://github.com/devcoinfet/CVE-2017-12617
nomisec WORKING POC
by K3ysTr0K3R · remote
https://github.com/K3ysTr0K3R/CVE-2017-12617-EXPLOIT
github WORKING POC
by manus-use · postscriptpoc
https://github.com/manus-use/cve-pocs/tree/main/CVE-2017-12617
nomisec WORKING POC
by qiantu88 · remote
https://github.com/qiantu88/CVE-2017-12617
nomisec WORKING POC
by yZee00 · poc
https://github.com/yZee00/CVE-2017-12617
github WORKING POC
by winterwolf32 · perlpoc
https://github.com/winterwolf32/CVE_Exploits-/tree/master/CVE-2017-12617
nomisec WORKING POC
by scirusvulgaris · remote
https://github.com/scirusvulgaris/CVE-2017-12617
nomisec WORKING POC
by DevaDJ · remote
https://github.com/DevaDJ/CVE-2017-12617
vulncheck_xdb WORKING POC
remote
https://github.com/zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717
exploitdb WORKING POC VERIFIED
by intx0x80 · pythonwebappsjsp
https://www.exploit-db.com/exploits/42966
vulncheck_xdb WORKING POC
remote
https://github.com/yZeetje/CVE-2017-12617
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotejava
https://www.exploit-db.com/exploits/43008
metasploit WORKING POC EXCELLENT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/tomcat_jsp_upload_bypass.rb

Nuclei Templates (1)

Apache Tomcat - Remote Code Execution
HIGHVERIFIEDby pussycat0x
Shodan: html:"Apache Tomcat" || http.title:"apache tomcat" || http.html:"apache tomcat" || cpe:"cpe:2.3:a:apache:tomcat"
FOFA: body="apache tomcat" || title="apache tomcat"

References (45)

... and 25 more

Scores

CVSS v3 8.1
EPSS 0.9436
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2022-03-25
VulnCheck KEV 2019-04-17
InTheWild.io 2019-04-23
ENISA EUVD EUVD-2022-5811

Classification

CWE
CWE-434
Status draft

Affected Products (50)

apache/tomcat < 7.0.82
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
oracle/agile_plm
oracle/agile_plm
oracle/agile_plm
oracle/agile_plm
oracle/communications_instant_messaging_server
oracle/endeca_information_discovery_integrator
oracle/endeca_information_discovery_integrator
oracle/enterprise_manager_for_mysql_database
oracle/financial_services_analytical_applications_infrastructure < 7.3.5.3.0
oracle/fmw_platform
... and 35 more

Timeline

Published Oct 04, 2017
KEV Added Mar 25, 2022
Tracked Since Feb 18, 2026