Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Tomcat | 9.0.0.M1 to 9.0.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution | https://github.com/cyberheartmi9/CVE-2017-12617 | POC Details |
| 2 | Code put together from a few peoples ideas credit given don't use maliciously please | https://github.com/devcoinfet/CVE-2017-12617 | POC Details |
| 3 | None | https://github.com/qiantu88/CVE-2017-12617 | POC Details |
| 4 | Proof of Concept - RCE Exploitation : Web Shell on Apache Tomcat - Ensimag January 2018 | https://github.com/ygouzerh/CVE-2017-12617 | POC Details |
| 5 | Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution for Python3 | https://github.com/tyranteye666/tomcat-cve-2017-12617 | POC Details |
| 6 | An implementation of CVE-2017-12617 | https://github.com/jptr218/tc_hack | POC Details |
| 7 | CVE-2017-12617 is a critical vulnerability leading to Remote Code Execution (RCE) in Apache Tomcat. | https://github.com/LongWayHomie/CVE-2017-12617 | POC Details |
| 8 | None | https://github.com/K3ysTr0K3R/CVE-2017-12617-EXPLOIT | POC Details |
| 9 | None | https://github.com/scirusvulgaris/CVE-2017-12617 | POC Details |
| 10 | CVE-2017-12617 | https://github.com/yZ1337/CVE-2017-12617 | POC Details |
| 11 | Improved version of PikaChu CVE | https://github.com/DevaDJ/CVE-2017-12617 | POC Details |
| 12 | When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-12617.yaml | POC Details |
| 13 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Tomcat%20RCE%20via%20JSP%20Upload%20Bypass.md | POC Details |
| 14 | CVE-2017-12617 | https://github.com/yZeetje/CVE-2017-12617 | POC Details |
| 15 | CVE-2017-12617 | https://github.com/yZee00/CVE-2017-12617 | POC Details |
| 16 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Tomcat%20RCE%20via%20JSP%20Upload%20Bypass%20CVE-2017-12617.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet