CVE-2017-12615
Find out more about CVE-2017-12615 from the MITRE CVE dictionary dictionary and NIST NVD.
Statement
This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.
CVSS v3 metrics
| CVSS3 Base Score | 8.1 |
|---|---|
| CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Attack Vector | Network |
| Attack Complexity | High |
| Privileges Required | None |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity Impact | High |
| Availability Impact | High |
Red Hat Security Errata
| Platform | Errata | Release Date |
|---|---|---|
| Red Hat JBoss Web Server 3.1 for RHEL 7 | RHSA-2018:0466 | 2018-03-07 |
| Red Hat JBoss Web Server 3.1 for RHEL 6 | RHSA-2018:0466 | 2018-03-07 |
| Red Hat JBoss Web Server 2.1 | RHSA-2017:3114 | 2017-11-02 |
| Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server | RHSA-2017:3113 | 2017-11-02 |
| Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server | RHSA-2017:3113 | 2017-11-02 |
| Red Hat Enterprise Linux 6 (tomcat6) | RHSA-2017:3080 | 2017-10-30 |
| Red Hat JBoss Web Server 3.1 | RHSA-2018:0465 | 2018-03-07 |
| Red Hat Enterprise Linux 7 (tomcat) | RHSA-2017:3081 | 2017-10-30 |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Software Collections for Red Hat Enterprise Linux | rh-java-common-tomcat | Not affected |
| Red Hat JBoss Portal Platform 6 | jbossweb | Not affected |
| Red Hat JBoss Operations Network 3 | jbossweb | Not affected |
| Red Hat JBoss Fuse 6 | jbossweb | Not affected |
| Red Hat JBoss EAP 6 | jbossweb | Not affected |
| Red Hat JBoss Data Virtualization 6 | jbossweb | Not affected |
| Red Hat JBoss Data Grid 6 | jbossweb | Not affected |
Mitigation
Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.
Block HTTP methods that permit resource modification for untrusted users.
