Lucene search

K
cveApacheCVE-2017-12616
HistorySep 19, 2017 - 1:29 p.m.

CVE-2017-12616

2017-09-1913:29:00
CWE-200
apache
web.nvd.nist.gov
171
In Wild
apache
tomcat
virtualdircontext
security bypass
cve-2017-12616
nvd

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

5.8

Confidence

High

EPSS

0.908

Percentile

98.9%

When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.

Affected configurations

Nvd
Vulners
Node
apachetomcatMatch7.0.0
OR
apachetomcatMatch7.0.0beta
OR
apachetomcatMatch7.0.1
OR
apachetomcatMatch7.0.2
OR
apachetomcatMatch7.0.2beta
OR
apachetomcatMatch7.0.3
OR
apachetomcatMatch7.0.4
OR
apachetomcatMatch7.0.4beta
OR
apachetomcatMatch7.0.5
OR
apachetomcatMatch7.0.5beta
OR
apachetomcatMatch7.0.6
OR
apachetomcatMatch7.0.7
OR
apachetomcatMatch7.0.8
OR
apachetomcatMatch7.0.9
OR
apachetomcatMatch7.0.10
OR
apachetomcatMatch7.0.11
OR
apachetomcatMatch7.0.12
OR
apachetomcatMatch7.0.13
OR
apachetomcatMatch7.0.14
OR
apachetomcatMatch7.0.15
OR
apachetomcatMatch7.0.16
OR
apachetomcatMatch7.0.17
OR
apachetomcatMatch7.0.18
OR
apachetomcatMatch7.0.19
OR
apachetomcatMatch7.0.20
OR
apachetomcatMatch7.0.21
OR
apachetomcatMatch7.0.22
OR
apachetomcatMatch7.0.23
OR
apachetomcatMatch7.0.24
OR
apachetomcatMatch7.0.25
OR
apachetomcatMatch7.0.26
OR
apachetomcatMatch7.0.27
OR
apachetomcatMatch7.0.28
OR
apachetomcatMatch7.0.29
OR
apachetomcatMatch7.0.30
OR
apachetomcatMatch7.0.31
OR
apachetomcatMatch7.0.32
OR
apachetomcatMatch7.0.33
OR
apachetomcatMatch7.0.34
OR
apachetomcatMatch7.0.35
OR
apachetomcatMatch7.0.36
OR
apachetomcatMatch7.0.37
OR
apachetomcatMatch7.0.38
OR
apachetomcatMatch7.0.39
OR
apachetomcatMatch7.0.40
OR
apachetomcatMatch7.0.41
OR
apachetomcatMatch7.0.42
OR
apachetomcatMatch7.0.43
OR
apachetomcatMatch7.0.44
OR
apachetomcatMatch7.0.45
OR
apachetomcatMatch7.0.46
OR
apachetomcatMatch7.0.47
OR
apachetomcatMatch7.0.48
OR
apachetomcatMatch7.0.49
OR
apachetomcatMatch7.0.50
OR
apachetomcatMatch7.0.51
OR
apachetomcatMatch7.0.54
OR
apachetomcatMatch7.0.55
OR
apachetomcatMatch7.0.56
OR
apachetomcatMatch7.0.57
OR
apachetomcatMatch7.0.58
OR
apachetomcatMatch7.0.59
OR
apachetomcatMatch7.0.60
OR
apachetomcatMatch7.0.61
OR
apachetomcatMatch7.0.62
OR
apachetomcatMatch7.0.63
OR
apachetomcatMatch7.0.64
OR
apachetomcatMatch7.0.65
OR
apachetomcatMatch7.0.66
OR
apachetomcatMatch7.0.67
OR
apachetomcatMatch7.0.68
OR
apachetomcatMatch7.0.69
OR
apachetomcatMatch7.0.70
OR
apachetomcatMatch7.0.71
OR
apachetomcatMatch7.0.72
OR
apachetomcatMatch7.0.73
OR
apachetomcatMatch7.0.74
OR
apachetomcatMatch7.0.75
OR
apachetomcatMatch7.0.76
OR
apachetomcatMatch7.0.77
OR
apachetomcatMatch7.0.79
OR
apachetomcatMatch7.0.80
VendorProductVersionCPE
apachetomcat7.0.39cpe:/a:apache:tomcat:7.0.39:::
apachetomcat7.0.14cpe:/a:apache:tomcat:7.0.14:::
apachetomcat7.0.26cpe:/a:apache:tomcat:7.0.26:::
apachetomcat7.0.23cpe:/a:apache:tomcat:7.0.23:::
apachetomcat7.0.34cpe:/a:apache:tomcat:7.0.34:::
apachetomcat7.0.17cpe:/a:apache:tomcat:7.0.17:::
apachetomcat7.0.25cpe:/a:apache:tomcat:7.0.25:::
apachetomcat7.0.36cpe:/a:apache:tomcat:7.0.36:::
apachetomcat7.0.13cpe:/a:apache:tomcat:7.0.13:::
apachetomcat7.0.56cpe:/a:apache:tomcat:7.0.56:::
Rows per page:
1-10 of 821

CNA Affected

[
  {
    "product": "Apache Tomcat",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "status": "affected",
        "version": "7.0.0 to 7.0.80"
      }
    ]
  }
]

References

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

5.8

Confidence

High

EPSS

0.908

Percentile

98.9%