First published: Wed Jan 31 2018(Updated: )
As part of the fix for bug 61201, the documentation for Apache Tomcat 9.0.0.M22 to 9.0.1, 8.5.16 to 8.5.23, 8.0.45 to 8.0.47 and 7.0.79 to 7.0.82 included an updated description of the search algorithm used by the CGI Servlet to identify which script to execute. The update was not correct. As a result, some scripts may have failed to execute as expected and other scripts may have been executed unexpectedly. Note that the behaviour of the CGI servlet has remained unchanged in this regard. It is only the documentation of the behaviour that was wrong and has been corrected.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | >=7.0.79<=7.0.82 | |
Apache Tomcat | >=8.0.45<=8.0.47 | |
Apache Tomcat | >=8.5.16<=8.5.23 | |
Apache Tomcat | =9.0.0-m22 | |
Apache Tomcat | =9.0.0-m25 | |
Apache Tomcat | =9.0.0-m26 | |
Apache Tomcat | =9.0.0-m27 | |
Apache Tomcat | =9.0.0-m3 | |
Apache Tomcat | =9.0.0-m4 | |
Apache Tomcat | =9.0.0-m6 | |
Apache Tomcat | =9.0.0-m8 | |
Apache Tomcat | =9.0.0-m9 | |
Apache Tomcat | =9.0.1 | |
Apache Tomcat | =9.0.0-milestone22 | |
Apache Tomcat | =9.0.0-milestone25 | |
Apache Tomcat | =9.0.0-milestone26 | |
Apache Tomcat | =9.0.0-milestone27 | |
Apache Tomcat | =9.0.0-milestone3 | |
Apache Tomcat | =9.0.0-milestone4 | |
Apache Tomcat | =9.0.0-milestone6 | |
Apache Tomcat | =9.0.0-milestone8 | |
Apache Tomcat | =9.0.0-milestone9 | |
maven/org.apache.tomcat:tomcat | >=7.0.79<7.0.84 | 7.0.84 |
maven/org.apache.tomcat:tomcat | >=8.0.45<8.0.48 | 8.0.48 |
maven/org.apache.tomcat:tomcat | >=8.5.16<8.5.24 | 8.5.24 |
maven/org.apache.tomcat:tomcat | >=9.0.0.M22<9.0.2 | 9.0.2 |
debian/tomcat9 | 9.0.43-2~deb11u10 9.0.43-2~deb11u11 9.0.70-2 9.0.95-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15706 is a vulnerability in Apache Tomcat that allows an attacker to execute arbitrary code via a specially crafted CGI script.
CVE-2017-15706 has a severity rating of 5.3 which is considered medium.
CVE-2017-15706 affects Apache Tomcat versions 9.0.0.M22 to 9.0.1, 8.5.16 to 8.5.23, 8.0.45 to 8.0.47, and 7.0.79 to 7.0.82.
To fix CVE-2017-15706 in Apache Tomcat, upgrade to version 9.0.31 or later for Tomcat 9, and version 8.5.24 or later for Tomcat 8.
More information about CVE-2017-15706 can be found at the following references: [CVE-2017-15706](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15706), [Apache Tomcat Mailing List](https://lists.apache.org/thread.html/e1ef853fc0079cdb55befbd2dac042934e49288b476d5f6a649e5da2@%3Cannounce.tomcat.apache.org%3E), [Ubuntu Security Notice USN-3665-1](https://ubuntu.com/security/notices/USN-3665-1).