0.967 High
EPSS
Percentile
99.7%
A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.
Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.
Block HTTP methods that permit resource modification for untrusted users.
0.967 High
EPSS
Percentile
99.7%