Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-12617 PoC — Apache Tomcat 安全漏洞

Source
Associated Vulnerability
Title:Apache Tomcat 安全漏洞 (CVE-2017-12617)
Description:When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
Description
An implementation of CVE-2017-12617
Readme
### This tool uses a vulrubility within Apache Tomcat called [CVE 2017 12617](https://nvd.nist.gov/vuln/detail/CVE-2017-12617) to gain remote access to any server with the PUT method enabled.
## It can be downloaded [here](https://github.com/jptr218/tc_hack/raw/main/tchack.exe) (you will need to run it from the command line)
### Usage:

### `tchack [target IP] [target port] `
File Snapshot

[4.0K] /data/pocs/0766afe6cb839c583e090a1cdaa833c9ae8d57ea ├── [ 379] README.md ├── [4.0K] src │   ├── [ 398] hdr.h │   ├── [1.8K] main.cpp │   ├── [ 967] misc.cpp │   └── [1.1K] payload.cpp └── [ 85K] tchack.exe 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →