Publish Time: 2017-09-21 16:37:59 UTC+8
Last Updated: 2017-12-18 15:26:57 UTC+8
Multiple security vulnerabilities have been found in Tomcat. These vulnerabilities allow remote attackers to execute arbitrary codes or may result in the leak of sensitive information from a vulnerable version of Tomcat.
- Impact: Important
- CVSS3 Base Score: 8.1
- CVSS3 Base Metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Impact: Moderate
- CVSS3 Base Score: 5.3
- CVSS3 Base Metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- Tomcat6 6.0.48-0107 and eariler
- Tomcat7 7.0.73-0110 and eariler
- All Synology models
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.
To fix the security issue, please update Tomcat7 to 7.0.82-0113 or above.
Tomcat6 has reached its end of life. We will no longer maintain this package.