CVE-2017-12617

HIGH KEV NUCLEI LAB

Apache Tomcat < 7.0.82 - Unrestricted File Upload

Title source: rule

Description

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Exploits (19)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotejava
https://www.exploit-db.com/exploits/43008
exploitdb WORKING POC VERIFIED
by intx0x80 · pythonwebappsjsp
https://www.exploit-db.com/exploits/42966
nomisec WORKING POC 394 stars
by cyberheartmi9 · remote
https://github.com/cyberheartmi9/CVE-2017-12617
nomisec WORKING POC 3 stars
by LongWayHomie · remote
https://github.com/LongWayHomie/CVE-2017-12617
nomisec WORKING POC 2 stars
by ygouzerh · remote
https://github.com/ygouzerh/CVE-2017-12617
github WORKING POC 1 stars
by vaishakhcv · perlpoc
https://github.com/vaishakhcv/CVE-exploits/tree/master/CVE-2017-12617
nomisec WORKING POC 1 stars
by jptr218 · remote
https://github.com/jptr218/tc_hack
nomisec WORKING POC 1 stars
by tyranteye666 · remote
https://github.com/tyranteye666/tomcat-cve-2017-12617
github WORKING POC
by manus-use · postscriptpoc
https://github.com/manus-use/cve-pocs/tree/main/CVE-2017-12617
nomisec WORKING POC
by DevaDJ · remote
https://github.com/DevaDJ/CVE-2017-12617
nomisec WORKING POC
by yZee00 · poc
https://github.com/yZee00/CVE-2017-12617
nomisec WORKING POC
by scirusvulgaris · remote
https://github.com/scirusvulgaris/CVE-2017-12617
nomisec WORKING POC
by K3ysTr0K3R · remote
https://github.com/K3ysTr0K3R/CVE-2017-12617-EXPLOIT
github WORKING POC
by winterwolf32 · perlpoc
https://github.com/winterwolf32/CVE_Exploits-/tree/master/CVE-2017-12617
nomisec WORKING POC
by qiantu88 · remote
https://github.com/qiantu88/CVE-2017-12617
nomisec WORKING POC
by devcoinfet · remote
https://github.com/devcoinfet/CVE-2017-12617
vulncheck_xdb WORKING POC
remote
https://github.com/yZeetje/CVE-2017-12617
vulncheck_xdb WORKING POC
remote
https://github.com/zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717
metasploit WORKING POC EXCELLENT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/tomcat_jsp_upload_bypass.rb

Nuclei Templates (1)

Apache Tomcat - Remote Code Execution
HIGHVERIFIEDby pussycat0x
Shodan: html:"Apache Tomcat" || http.title:"apache tomcat" || http.html:"apache tomcat" || cpe:"cpe:2.3:a:apache:tomcat"
FOFA: body="apache tomcat" || title="apache tomcat"

References (45)

... and 25 more

Scores

CVSS v3 8.1
EPSS 0.9436
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Lab Environment

COMMUNITY
Community Lab
docker pull tomcat:8.5.0
docker pull tomcat:9.0.11
+14 more repos

Details

CISA KEV 2022-03-25
VulnCheck KEV 2019-04-17
InTheWild.io 2019-04-23
ENISA EUVD EUVD-2022-5811
CWE
CWE-434
Status published
Products (50)
apache/tomcat 7.0.0 - 7.0.82
Apache Software Foundation/Apache Tomcat 7.0.0 to 7.0.81
Apache Software Foundation/Apache Tomcat 8.0.0.RC1 to 8.0.46
Apache Software Foundation/Apache Tomcat 8.5.0 to 8.5.22
Apache Software Foundation/Apache Tomcat 9.0.0.M1 to 9.0.0
canonical/ubuntu_linux 12.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 17.10
canonical/ubuntu_linux 18.04
debian/debian_linux 7.0
... and 40 more
Published Oct 04, 2017
KEV Added Mar 25, 2022
Tracked Since Feb 18, 2026