Is the DCS manager affected by "CVE-2017-12615 " "CVE-2017-12616 " "CVE-2017-12617"

book

Article ID: 170272

calendar_today

Updated On:

Products

Data Center Security Server Data Center Security Server Advanced

Issue/Introduction

CVE-2017-12617

 

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialization parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVE-2017-12617 is the same vulnerability as CVE-2017-12615, DCS Management Server is not impacted.

web link - https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-apache-tomcat-could-allow-for-remote-code-execution/

CVE-2017-12616

  

When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request. DCS Management Server does not uses VirtualDirContext, so it is not impacted.
CVE-2017-12615

 

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialization parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Thou we have PUT enabled (MUST HAVE FOR APIs) for DCS Server, we do not have any general PUT APIs.  All our PUT APIs update objects in our system and does not generically same to the file system.  Based on this we are not affected.

Resolution

CVE-2017-12617

 

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialization parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVE-2017-12617 is the same vulnerability as CVE-2017-12615, DCS Management Server is not impacted.

web link - https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-apache-tomcat-could-allow-for-remote-code-execution/

CVE-2017-12616

  

When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request. DCS Management Server does not uses VirtualDirContext, so it is not impacted.
CVE-2017-12615

 

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialization parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Thou we have PUT enabled (MUST HAVE FOR APIs) for DCS Server, we do not have any general PUT APIs.  All our PUT APIs update objects in our system and does not generically same to the file system.  Based on this we are not affected.