### [CVE-2017-12617](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12617) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20Tomcat&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brighgreen) ### Description When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. ### POC #### Reference - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - https://www.exploit-db.com/exploits/42966/ - https://www.exploit-db.com/exploits/43008/ #### Github - https://github.com/0x0d3ad/Kn0ck - https://github.com/0x4D5352/rekall-penetration-test - https://github.com/0xh4di/PayloadsAllTheThings - https://github.com/1120362990/vulnerability-list - https://github.com/20142995/sectool - https://github.com/3ndG4me/ghostcat - https://github.com/3vikram/Application-Vulnerabilities-Payloads - https://github.com/84KaliPleXon3/Payloads_All_The_Things - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/CrackerCat/myhktools - https://github.com/Cyberleet1337/Payloadswebhack - https://github.com/Delishsploits/PayloadsAndMethodology - https://github.com/DynamicDesignz/Alien-Framework - https://github.com/GhostTroops/TOP - https://github.com/GhostTroops/myhktools - https://github.com/GuynnR/Payloads - https://github.com/JERRY123S/all-poc - https://github.com/JSchauert/Penetration-Testing-2 - https://github.com/JSchauert/Project-2-Offensive-Security-CTF - https://github.com/K3ysTr0K3R/CVE-2017-12617-EXPLOIT - https://github.com/Kaizhe/attacker - https://github.com/Lodoelama/Offensive-Security-CTF-Project - https://github.com/LongWayHomie/CVE-2017-12617 - https://github.com/Maarckz/PayloadParaTudo - https://github.com/Muhammd/Awesome-Payloads - https://github.com/Nieuport/PayloadsAllTheThings - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/Pav-ksd-pl/PayloadsAllTheThings - https://github.com/Prodject/Kn0ck - https://github.com/R0B1NL1N/YAWAST - https://github.com/Ra7mo0on/PayloadsAllTheThings - https://github.com/SexyBeast233/SecBooks - https://github.com/Soldie/PayloadsAllTheThings - https://github.com/XPR1M3/Payloads_All_The_Things - https://github.com/andrysec/PayloadsAllVulnerability - https://github.com/anhtu97/PayloadAllEverything - https://github.com/apkadmin/PayLoadsAll - https://github.com/aseams/Pentest-Toolkit - https://github.com/aylincetin/PayloadsAllTheThings - https://github.com/chanchalpatra/payload - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/cyberheartmi9/CVE-2017-12617 - https://github.com/d0n601/Pentest-Cheat-Sheet - https://github.com/davidxuan/CSCI-578-project - https://github.com/devcoinfet/CVE-2017-12617 - https://github.com/do0dl3/myhktools - https://github.com/enomothem/PenTestNote - https://github.com/falocab/PayloadsAllTheThings - https://github.com/forkercat/578-is-great - https://github.com/gkfnf/FK-17-12617 - https://github.com/hanguokr/tomcat_0day - https://github.com/hellochunqiu/PayloadsAllTheThings - https://github.com/hktalent/TOP - https://github.com/hktalent/myhktools - https://github.com/ilmari666/cybsec - https://github.com/iqrok/myhktools - https://github.com/itsamirac1e/Offensive_Security_CTF_Rekall - https://github.com/jbmihoub/all-poc - https://github.com/jptr218/tc_hack - https://github.com/kk98kk0/Payloads - https://github.com/koutto/jok3r-pocs - https://github.com/ksw9722/PayloadsAllTheThings - https://github.com/lnick2023/nicenice - https://github.com/maya6/-scan- - https://github.com/mrhacker51/ReverseShellCommands - https://github.com/mussar0x4D5352/rekall-penetration-test - https://github.com/nevidimk0/PayloadsAllTheThings - https://github.com/niksouy/Penetration-Test-and-Report - https://github.com/oneplus-x/Sn1per - https://github.com/oneplus-x/jok3r - https://github.com/ozkanbilge/Payloads - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/qiantu88/CVE-2017-12617 - https://github.com/r3p3r/adamcaudill-yawast - https://github.com/ranjan-prp/PayloadsAllTheThings - https://github.com/raoufmaklouf/cve5scan - https://github.com/ravijainpro/payloads_xss - https://github.com/scxiaotan1/Docker - https://github.com/sobinge/--1 - https://github.com/sobinge/PayloadsAllTheThings - https://github.com/sobinge/PayloadsAllThesobinge - https://github.com/touchmycrazyredhat/myhktools - https://github.com/trhacknon/myhktools - https://github.com/tyranteye666/tomcat-cve-2017-12617 - https://github.com/unusualwork/Sn1per - https://github.com/weeka10/-hktalent-TOP - https://github.com/winterwolf32/PayloadsAllTheThings - https://github.com/woods-sega/woodswiki - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/ycdxsb/Exploits - https://github.com/ygouzerh/CVE-2017-12617 - https://github.com/zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717