On 02/10/17 10:13, Rainer Jung wrote:
> Am 01.10.2017 um 20:10 schrieb ma...@apache.org:
>> Author: markt
>> Date: Sun Oct  1 18:10:45 2017
>> New Revision: 1810270
>>
>> URL: http://svn.apache.org/viewvc?rev=1810270&view=rev
>> Log:
>> Add CVE-2017-12617
>>
> ...
>> +<p>When running on Windows with HTTP PUTs enabled (e.g. via setting the
>> +       <code>readonly</code> initialisation parameter of the Default to 
>> false)
>> +       it was possible to upload a JSP file to the server via a specially
>> +       crafted request. This JSP could then be requested and any code it
>> +       contained would be executed by the server.</p>
> ...
> 
> It seems the description (for TC 7, 8 and 9) was copied from
> CVE-2017-12615, thus only refers to Windows and the Default servlet.
> Your original description of the topic was broader.

Indeed. I'll get that fixed. Thanks for catching that.

Mark

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to