DescriptionWhen running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
Debian Bugs802312

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tomcat7 (PTS)wheezy7.0.28-4+deb7u4vulnerable
wheezy (security)7.0.28-4+deb7u15vulnerable
jessie (security), jessie7.0.56-3+deb8u11vulnerable
buster, sid7.0.78-1fixed
tomcat8 (PTS)jessie8.0.14-1+deb8u10vulnerable
jessie (security)8.0.14-1+deb8u11vulnerable
stretch (security), stretch8.5.14-1+deb9u2vulnerable
buster, sid8.5.23-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


Since 7.0.72-3, src:tomcat7 only builds the Servlet API (8.5.x) (8.5.x) (8.5.x) (8.0.x) (7.0.x) (7.0.x) (7.0.x) (7.0.x)

Search for package or bug name: Reporting problems