5
CVSSv2

CVE-2017-12616

Published: 19/09/2017 Updated: 15/04/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 449
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 7.0.0

apache tomcat 7.0.4

apache tomcat 7.0.5

apache tomcat 7.0.11

apache tomcat 7.0.12

apache tomcat 7.0.20

apache tomcat 7.0.21

apache tomcat 7.0.28

apache tomcat 7.0.29

apache tomcat 7.0.36

apache tomcat 7.0.37

apache tomcat 7.0.45

apache tomcat 7.0.46

apache tomcat 7.0.55

apache tomcat 7.0.56

apache tomcat 7.0.63

apache tomcat 7.0.1

apache tomcat 7.0.6

apache tomcat 7.0.13

apache tomcat 7.0.14

apache tomcat 7.0.22

apache tomcat 7.0.23

apache tomcat 7.0.30

apache tomcat 7.0.31

apache tomcat 7.0.38

apache tomcat 7.0.39

apache tomcat 7.0.47

apache tomcat 7.0.48

apache tomcat 7.0.57

apache tomcat 7.0.58

apache tomcat 7.0.2

apache tomcat 7.0.7

apache tomcat 7.0.8

apache tomcat 7.0.15

apache tomcat 7.0.16

apache tomcat 7.0.24

apache tomcat 7.0.25

apache tomcat 7.0.32

apache tomcat 7.0.33

apache tomcat 7.0.40

apache tomcat 7.0.41

apache tomcat 7.0.42

apache tomcat 7.0.49

apache tomcat 7.0.50

apache tomcat 7.0.59

apache tomcat 7.0.60

apache tomcat 7.0.67

apache tomcat 7.0.68

apache tomcat 7.0.69

apache tomcat 7.0.76

apache tomcat 7.0.77

apache tomcat 7.0.3

apache tomcat 7.0.9

apache tomcat 7.0.10

apache tomcat 7.0.17

apache tomcat 7.0.18

apache tomcat 7.0.19

apache tomcat 7.0.26

apache tomcat 7.0.27

apache tomcat 7.0.34

apache tomcat 7.0.35

apache tomcat 7.0.43

apache tomcat 7.0.44

apache tomcat 7.0.51

apache tomcat 7.0.54

apache tomcat 7.0.61

apache tomcat 7.0.62

apache tomcat 7.0.70

apache tomcat 7.0.71

apache tomcat 7.0.79

apache tomcat 7.0.80

apache tomcat 7.0.64

apache tomcat 7.0.72

apache tomcat 7.0.73

apache tomcat 7.0.65

apache tomcat 7.0.66

apache tomcat 7.0.74

apache tomcat 7.0.75

Vendor Advisories

Synopsis Important: Red Hat JBoss Web Server 310 Service Pack 2 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Web Server 31Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scori ...
Synopsis Important: Red Hat JBoss Web Server 310 Service Pack 2 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Web Server 31 for RHEL 6 and Red Hat JBoss Web Server 31 for RHEL 7Red Hat Product Security has rated this update as having a sec ...
Arch Linux Security Advisory ASA-201709-17 ========================================== Severity: Medium Date : 2017-09-19 CVE-ID : CVE-2017-12616 Package : tomcat7 Type : information disclosure Remote : Yes Link : securityarchlinuxorg/AVG-408 Summary ======= The package tomcat7 before version 7081-1 is vulnerable to informa ...
It has been discovered that tomcat version 7080 and before are vulnerable to information disclosure When using a VirtualDirContext it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request ...
Several security issues were fixed in Tomcat ...
Debian Bug report logs - #898935 tomcat8: CVE-2018-8014: The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' Package: src:tomcat8; Maintainer for src:tomcat8 is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccors ...
Symantec Network Protection products using affected versions of Apache Tomcat are susceptible to multiple security vulnerabilities  A remote attacker, with access to the management interface, can obtain sensitive information from the server, modify information associated with a different web application, execute arbitrary code, modify server beha ...

Github Repositories

Tomcat_PUT_EXP_V12 Tomcat PUT方法任意文件写入(CVE-2017-12615)图形化漏洞利用工具 漏洞介绍 2017年9月19日,Apache Tomcat官方确认并修复了两个高危漏洞,漏洞CVE编号:CVE-2017-12615和CVE-2017-12616,其中 远程代码执行漏洞(CVE-2017-12615) 影响: Apache Tomcat 700 - 7079(7081修复不完全) 当 Tomcat 运行

CVE-2017-12165 POC/EXP编写过程记录 漏洞介绍 Tomcat 运行在 Windows 主机上,且启用了HTTP PUT请求方法(例如,将 readonly 初始化参数由默认值设置为 false),攻击者将有可能可通过精心构造的攻击请求数据包向服务器上传包含任意代码的 JSP 的webshell文件,JSP文件中的恶意代码将能被服务器执行,

CVE-2017-12165 POC/EXP编写过程记录 漏洞介绍 Tomcat 运行在 Windows 主机上,且启用了HTTP PUT请求方法(例如,将 readonly 初始化参数由默认值设置为 false),攻击者将有可能可通过精心构造的攻击请求数据包向服务器上传包含任意代码的 JSP 的webshell文件,JSP文件中的恶意代码将能被服务器执行,

A self-using enviroment with docker support, for development and vulnerability analyze vulhub is docker based project for speed up enviroment creation Is useful for vulnerability analyze and replay This repository was craeted because I'm lazy to pull request a new enviroment to vulhub and the most enviroment of vulhub has no detail on how they build the image, I know it

红队作战中比较常遇到的一些重点系统漏洞整理。

红队中易被攻击的一些重点系统漏洞整理 一、OA系统 泛微(Weaver-Ecology-OA) 泛微OA E-cology RCE(CNVD-2019-32204) - 影响版本70/80/81/90 泛微OA WorkflowCenterTreeData接口注入(限oracle数据库) 泛微ecology OA数据库配置信息泄露 泛微OA云桥任意文件读取 - 影响2018-2019 多个版本 泛微 e-cology OA 前台SQL注入漏

最新文库为PeiQi文库在202107之后的文档或未记录的文档、常用文档 查看历史文库-PeiQi 20220106更新 JBoss 20220105更新 log4j远程代码执行 Gitlab-CVE-2021-22205 Grafana-CVE-2021-43798 Atlassian_Confluence_远程代码执行漏洞(CVE-2021-26084) Zabbix Apache_Struts Spring_Boot 快速查阅 fastjson 通过Dnslog判断是否使用fastj

Twitter: @Hktalent3135773 penetration tools dependencies Command Description kali linux recommend system node js program runtime javac, java auto generate payload metasploit auto generate payload, and autoexploit gcc auto generate payload tmux auto background send payload, shell Bash base64, tr, nc, auto generate payload python auto genera

Twitter: @Hktalent3135773 penetration tools dependencies Command Description kali linux recommend system node js program runtime javac, java auto generate payload metasploit auto generate payload, and autoexploit gcc auto generate payload tmux auto background send payload, shell Bash base64, tr, nc, auto generate payload python auto genera

https://51pwn.com,Awesome Penetration Testing,hacker tools collection, metasploit exploit, meterpreter....struts2、weblogic, 0day,poc,apt,backdoor,VulApps,vuln,pentest-script

Twitter: @Hktalent3135773 penetration tools dependencies Command Description kali linux recommend system node js program runtime javac, java auto generate payload metasploit auto generate payload, and autoexploit gcc auto generate payload tmux auto background send payload, shell Bash base64, tr, nc, auto generate payload python auto genera

框架漏洞复现 spring漏洞复现 SpringSecurityOauth RCE (CVE-2016-4977) 漏洞简述 影响版本 环境搭建 漏洞复现 Spring Web Flow(CVE-2017-4971)远程代码执行 漏洞简述 影响版本 环境搭建 漏洞复现 Spring Data Rest 远程命令执行漏洞复现(CVE-2017-8046) 漏洞简述 影响版本 环境搭建 漏洞复现 Spring Messaging 远程

信息收集 主机信息收集 敏感目录文件收集 目录爆破 字典 BurpSuite 搜索引擎语法 Google Hack DuckDuckgo 可搜索微博、人人网等屏蔽了主流搜索引擎的网站 Bing js文件泄漏后台或接口信息 快捷搜索第三方资源 findjs robotstxt 目录可访问( autoindex ) iis短文件名 IIS-ShortName-Scanner

SecBooks 各大文库公众号文章收集,部分文库使用gitbook部署;部分公众号使用杂散文章为主。 使用插件 "hide-element", "back-to-top-button", "-lunr", "-search", "search-pro", "splitter" #目录自动生成插件(book sm) npm install -g gitbook-summ