# N/A
## 漏洞概述
Apache Tomcat 7.0.0 到 7.0.79 版本在 Windows 上运行时,当 HTTP PUT 方法启用时,攻击者可以通过精心设计的请求上传一个 JSP 文件。此 JSP 文件可以被请求并执行其中的恶意代码。
## 影响版本
- Apache Tomcat 7.0.0 - 7.0.79
## 漏洞细节
在 Windows 平台上运行的 Apache Tomcat 7.0.0 到 7.0.79 版本中,如果允许 HTTP PUT 方法(例如通过将 `Default` 的 `readonly` 初始化参数设为 `false`),攻击者可以上传一个 JSP 文件。上传的 JSP 文件将存储在服务器上,并且通过请求该文件,其中的代码可以被执行。
## 影响
攻击者可以通过上传并执行恶意 JSP 文件来执行任意代码,从而导致服务器被完全控制或敏感数据泄露。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability. | https://github.com/breaktoprotect/CVE-2017-12615 | POC详情 |
2 | just a python script for cve-2017-12615 | https://github.com/mefulton/cve-2017-12615 | POC详情 |
3 | CVE-2017-12617 and CVE-2017-12615 for tomcat server | https://github.com/zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717 | POC详情 |
4 | tomcat-put-cve-2017-12615 | https://github.com/wsg00d/cve-2017-12615 | POC详情 |
5 | Tomcat 远程代码执行漏洞 Exploit | https://github.com/BeyondCy/CVE-2017-12615 | POC详情 |
6 | CVE-2017-12615 Tomcat RCE (TESTED) | https://github.com/1337g/CVE-2017-12615 | POC详情 |
7 | tomcat7.x远程命令执行 | https://github.com/Shellkeys/CVE-2017-12615 | POC详情 |
8 | cve-2017-12615 | https://github.com/cved-sources/cve-2017-12615 | POC详情 |
9 | CVE-2017-12615 批量脚本 | https://github.com/ianxtianxt/CVE-2017-12615 | POC详情 |
10 | None | https://github.com/cyberharsh/Tomcat-CVE-2017-12615 | POC详情 |
11 | CVE-2017-12615 任意文件写入exp,写入webshell | https://github.com/w0x68y/CVE-2017-12615-EXP | POC详情 |
12 | Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取/包含 | https://github.com/tpt11fb/AttackTomcat | POC详情 |
13 | Tomcat PUT方法任意文件写入(CVE-2017-12615)exp | https://github.com/xiaokp7/Tomcat_PUT_GUI_EXP | POC详情 |
14 | None | https://github.com/K3ysTr0K3R/CVE-2017-12615-EXPLOIT | POC详情 |
15 | 最新tomcat漏洞扫描工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615文件上传 | https://github.com/lizhianyuguangming/TomcatWeakPassChecker | POC详情 |
16 | 最新tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938/CNVD-2020-10487 文件包含 | https://github.com/lizhianyuguangming/TomcatScanPro | POC详情 |
17 | None | https://github.com/wudidwo/CVE-2017-12615-poc | POC详情 |
18 | Apache Tomcat servers 7.0.{0 to 79} are susceptible to remote code execution. By design, you are not allowed to upload JSP files via the PUT method. This is likely a security measure to prevent an attacker from uploading a JSP shell and gaining remote code execution on the server. However, due to the insufficient checks, an attacker could gain remote code execution on Apache Tomcat servers that have enabled PUT method by using a specially crafted HTTP request. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-12615.yaml | POC详情 |
19 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Tomcat%20PUT%E6%96%B9%E6%B3%95%E4%BB%BB%E6%84%8F%E5%86%99%E6%96%87%E4%BB%B6%E6%BC%8F%E6%B4%9E%20CVE-2017-12615.md | POC详情 |
20 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Tomcat%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-12615.md | POC详情 |
21 | https://github.com/vulhub/vulhub/blob/master/tomcat/CVE-2017-12615/README.md | POC详情 | |
22 | PoC environment and exploit for the Apache Tomcat on Windows Remote Code Execution Vulnerability | https://github.com/edyekomu/CVE-2017-12615-PoC | POC详情 |
暂无评论