Published: 12/09/2014 Updated: 07/01/2021
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Unrestricted file upload vulnerability in Apache Tomcat 7.x prior to 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote malicious users to execute arbitrary code by uploading and accessing a JSP file.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 7.0.11

apache tomcat 7.0.12

apache tomcat 7.0.19

apache tomcat 7.0.2

apache tomcat 7.0.26

apache tomcat 7.0.27

apache tomcat 7.0.33

apache tomcat 7.0.34

apache tomcat 7.0.4

apache tomcat 7.0.1

apache tomcat 7.0.10

apache tomcat 7.0.17

apache tomcat 7.0.18

apache tomcat 7.0.23

apache tomcat 7.0.24

apache tomcat 7.0.25

apache tomcat 7.0.31

apache tomcat 7.0.32

apache tomcat

apache tomcat 7.0.0

apache tomcat 7.0.15

apache tomcat 7.0.16

apache tomcat 7.0.21

apache tomcat 7.0.22

apache tomcat 7.0.3

apache tomcat 7.0.30

apache tomcat 7.0.37

apache tomcat 7.0.38

apache tomcat 7.0.13

apache tomcat 7.0.14

apache tomcat 7.0.20

apache tomcat 7.0.28

apache tomcat 7.0.29

apache tomcat 7.0.35

apache tomcat 7.0.36

Vendor Advisories

Unrestricted file upload vulnerability in Apache Tomcat 7x before 7040, in certain situations involving outdated javaioFile code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file ...
It was discovered that malicious web applications could use the Expression Language to bypass protections of a Security Manager as expressions were evaluated within a privileged code section For the oldstable distribution (wheezy), this problem has been fixed in version 7028-4+deb7u3 This update also provides fixes for CVE-2013-4444, CVE-2014-0 ...
Oracle Critical Patch Update Advisory - October 2016 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previou ...

Github Repositories

Compiled dataset of Java deserialization CVEs

Java-Deserialization-CVEs This is a dataset of CVEs related to Java Deserialization Since existing CVE databases do not allow for granular searches by vulnerability type and language, this list was compiled by manually searching the NIST NVD CVE database with different queries If you notice any discrepancies, contributions are very welcome! CVE ID Year CVSS 3/31 risk CV