CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2017-5664 Amazon Linux Security Advisory for tomcat8: ALAS-2017-862

2017年8月13日 1183点热度 0人点赞 0条评论

漏洞类别:Amazon Linux

漏洞等级:

漏洞信息

Security constrained bypass in error page mechanism:
A vulnerability was discovered in the error page mechanism in Tomcat's DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664 )

QID Detection Logic:
This authenticated QID verifies if the version of the following files is lesser than 8.0.45-1.72.amzn1: tomcat8-webapps, tomcat8-docs-webapp, tomcat8, tomcat8-javadoc, tomcat8-lib, tomcat8-servlet-3.1-api, tomcat8-admin-webapps, tomcat8-el-3.0-api, tomcat8-jsp-2.3-api, tomcat8-log4j

漏洞危害

Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.

解决方案

Please refer to Amazon advisory ALAS-2017-862 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

ALAS-2017-862: Amazon Linux (tomcat8 (8.0.45-1.72.amzn1) on src)

ALAS-2017-862: Amazon Linux (tomcat8 (8.0.45-1.72.amzn1) on noarch)

0daybank

标签: 暂无
最后更新:2017年8月13日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me