# N/A
## 概述
Apache Tomcat 版本 9.0.0.M1 到 9.0.0, 8.5.0 到 8.5.22, 8.0.0.RC1 到 8.0.46 和 7.0.0 到 7.0.81 中存在漏洞。当 HTTP PUT 操作启用时(例如,通过将 Default Servlet 的 readonly 初始化参数设置为 false),可通过精心构造的请求上传一个 JSP 文件到服务器。上传的 JSP 文件中的代码会被服务器执行。
## 影响版本
- 9.0.0.M1 到 9.0.0
- 8.5.0 到 8.5.22
- 8.0.0.RC1 到 8.0.46
- 7.0.0 到 7.0.81
## 细节
此漏洞存在于 Apache Tomcat 中,当 HTTP PUT 操作启用时,攻击者可以通过精心构造的请求上传一个 JSP 文件。这对于设置了 Default Servlet 的 readonly 参数为 false 的系统而言是可能的。
## 影响
上传的 JSP 文件可以被请求,并且该文件中的代码会被服务器执行,这可能允许攻击者执行任意代码。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution | https://github.com/cyberheartmi9/CVE-2017-12617 | POC详情 |
2 | Code put together from a few peoples ideas credit given don't use maliciously please | https://github.com/devcoinfet/CVE-2017-12617 | POC详情 |
3 | None | https://github.com/qiantu88/CVE-2017-12617 | POC详情 |
4 | Proof of Concept - RCE Exploitation : Web Shell on Apache Tomcat - Ensimag January 2018 | https://github.com/ygouzerh/CVE-2017-12617 | POC详情 |
5 | Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution for Python3 | https://github.com/tyranteye666/tomcat-cve-2017-12617 | POC详情 |
6 | An implementation of CVE-2017-12617 | https://github.com/jptr218/tc_hack | POC详情 |
7 | CVE-2017-12617 is a critical vulnerability leading to Remote Code Execution (RCE) in Apache Tomcat. | https://github.com/LongWayHomie/CVE-2017-12617 | POC详情 |
8 | None | https://github.com/K3ysTr0K3R/CVE-2017-12617-EXPLOIT | POC详情 |
9 | None | https://github.com/scirusvulgaris/CVE-2017-12617 | POC详情 |
10 | CVE-2017-12617 | https://github.com/yZ1337/CVE-2017-12617 | POC详情 |
11 | Improved version of PikaChu CVE | https://github.com/DevaDJ/CVE-2017-12617 | POC详情 |
12 | When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-12617.yaml | POC详情 |
13 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Tomcat%20RCE%20via%20JSP%20Upload%20Bypass.md | POC详情 |
14 | CVE-2017-12617 | https://github.com/yZeetje/CVE-2017-12617 | POC详情 |
15 | CVE-2017-12617 | https://github.com/yZee00/CVE-2017-12617 | POC详情 |
暂无评论