Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution
Switch branches/tags
Nothing to show
Clone or download
Failed to load latest commit information.
screenshots Add files via upload Oct 8, 2017
.gitignore Initial commit Oct 5, 2017
LICENSE Initial commit Oct 5, 2017
README.md Update README.md Oct 6, 2017
tomcat-cve-2017-12617.py Update tomcat-cve-2017-12617.py Oct 11, 2017



CVE-2017-12617 critical Remote Code Execution (RCE) vulnerability discovered in Apache Tomcat

affect systems with HTTP PUTs enabled (via setting the "read-only" initialization parameter of the Default servlet to "false") are affected.

Tomcat versions before 9.0.1 (Beta), 8.5.23, 8.0.47 and 7.0.82 contain a potentially dangerous

remote code execution (RCE) vulnerability on all operating systems if the default servlet is

configured with the parameter readonly set to false or the WebDAV servlet is enabled with the

parameter readonly set to false

Apache Tomcat page

./cve-2017-12617.py [options]


-u ,--url [::] check target url if it's vulnerable
-p,--pwn [::] generate webshell and upload it
-l,--list [::] hosts list


./cve-2017-12617.py -u
./cve-2017-12617.py --url
./cve-2017-12617.py -u -p pwn
./cve-2017-12617.py --url -pwn pwn
./cve-2017-12617.py -l hotsts.txt
./cve-2017-12617.py --list hosts.txt

alt text

alt text

Check target if it's vulneabel
alt text

Confirm file was created
alt text

Create Webshell and get shell alt text

Scan hosts in txt file
alt text

[ @intx0x80 ]