7.5
CWE
755
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2017-5664

First published: Tue Jun 06 2017(Updated: )

The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request is presented to the error page with the original HTTP method. If the error page is a static file, expected behaviour is to serve content of the file as if processing a GET request, regardless of the actual HTTP method. The Default Servlet in Apache Tomcat 9.0.0.M1 to 9.0.0.M20, 8.5.0 to 8.5.14, 8.0.0.RC1 to 8.0.43 and 7.0.0 to 7.0.77 did not do this. Depending on the original request this could lead to unexpected and undesirable results for static error pages including, if the DefaultServlet is configured to permit writes, the replacement or removal of the custom error page. Notes for other user provided error pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP method. JSPs used as error pages must must ensure that they handle any error dispatch as a GET request, regardless of the actual method. (2) By default, the response generated by a Servlet does depend on the HTTP method. Custom Servlets used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method.

Credit: security@apache.org security@apache.org security@apache.org

Affected SoftwareAffected VersionHow to fix
redhat/tomcat<7.0.78
7.0.78
redhat/tomcat<8.0.44
8.0.44
redhat/tomcat<8.5.15
8.5.15
maven/org.apache.tomcat:tomcat>=7.0.0<=7.0.77
7.0.78
maven/org.apache.tomcat:tomcat>=8.0.0<=8.0.43
8.0.44
maven/org.apache.tomcat:tomcat>=8.5.0<=8.5.14
8.5.15
maven/org.apache.tomcat:tomcat>=9.0.0.M1<=9.0.0.M20
9.0.0.M21
Tomcat=7.0.0
Tomcat=7.0.0-beta
Tomcat=7.0.1
Tomcat=7.0.2
Tomcat=7.0.2-beta
Tomcat=7.0.3
Tomcat=7.0.4
Tomcat=7.0.4-beta
Tomcat=7.0.5
Tomcat=7.0.5-beta
Tomcat=7.0.6
Tomcat=7.0.7
Tomcat=7.0.8
Tomcat=7.0.9
Tomcat=7.0.10
Tomcat=7.0.11
Tomcat=7.0.12
Tomcat=7.0.13
Tomcat=7.0.14
Tomcat=7.0.15
Tomcat=7.0.16
Tomcat=7.0.17
Tomcat=7.0.18
Tomcat=7.0.19
Tomcat=7.0.20
Tomcat=7.0.21
Tomcat=7.0.22
Tomcat=7.0.23
Tomcat=7.0.24
Tomcat=7.0.25
Tomcat=7.0.26
Tomcat=7.0.27
Tomcat=7.0.28
Tomcat=7.0.29
Tomcat=7.0.30
Tomcat=7.0.31
Tomcat=7.0.32
Tomcat=7.0.33
Tomcat=7.0.34
Tomcat=7.0.35
Tomcat=7.0.36
Tomcat=7.0.37
Tomcat=7.0.38
Tomcat=7.0.39
Tomcat=7.0.40
Tomcat=7.0.41
Tomcat=7.0.42
Tomcat=7.0.43
Tomcat=7.0.44
Tomcat=7.0.45
Tomcat=7.0.46
Tomcat=7.0.47
Tomcat=7.0.48
Tomcat=7.0.49
Tomcat=7.0.50
Tomcat=7.0.51
Tomcat=7.0.54
Tomcat=7.0.55
Tomcat=7.0.56
Tomcat=7.0.57
Tomcat=7.0.58
Tomcat=7.0.59
Tomcat=7.0.60
Tomcat=7.0.61
Tomcat=7.0.62
Tomcat=7.0.63
Tomcat=7.0.64
Tomcat=7.0.65
Tomcat=7.0.66
Tomcat=7.0.67
Tomcat=7.0.68
Tomcat=7.0.69
Tomcat=7.0.70
Tomcat=7.0.71
Tomcat=7.0.72
Tomcat=7.0.73
Tomcat=7.0.74
Tomcat=7.0.75
Tomcat=7.0.76
Tomcat=7.0.77
Tomcat=8.0.0-rc1
Tomcat=8.0.0-rc10
Tomcat=8.0.0-rc3
Tomcat=8.0.0-rc5
Tomcat=8.0.1
Tomcat=8.0.2
Tomcat=8.0.3
Tomcat=8.0.4
Tomcat=8.0.5
Tomcat=8.0.6
Tomcat=8.0.7
Tomcat=8.0.9
Tomcat=8.0.10
Tomcat=8.0.11
Tomcat=8.0.12
Tomcat=8.0.13
Tomcat=8.0.14
Tomcat=8.0.15
Tomcat=8.0.16
Tomcat=8.0.17
Tomcat=8.0.18
Tomcat=8.0.19
Tomcat=8.0.20
Tomcat=8.0.21
Tomcat=8.0.22
Tomcat=8.0.23
Tomcat=8.0.24
Tomcat=8.0.25
Tomcat=8.0.26
Tomcat=8.0.27
Tomcat=8.0.28
Tomcat=8.0.29
Tomcat=8.0.30
Tomcat=8.0.31
Tomcat=8.0.32
Tomcat=8.0.33
Tomcat=8.0.34
Tomcat=8.0.35
Tomcat=8.0.36
Tomcat=8.0.37
Tomcat=8.0.38
Tomcat=8.0.39
Tomcat=8.0.40
Tomcat=8.0.41
Tomcat=8.0.42
Tomcat=8.0.43
Tomcat=8.5.0
Tomcat=8.5.1
Tomcat=8.5.2
Tomcat=8.5.3
Tomcat=8.5.4
Tomcat=8.5.5
Tomcat=8.5.6
Tomcat=8.5.7
Tomcat=8.5.8
Tomcat=8.5.9
Tomcat=8.5.10
Tomcat=8.5.11
Tomcat=8.5.12
Tomcat=8.5.13
Tomcat=8.5.14
Tomcat=9.0.0-milestone1
Tomcat=9.0.0-milestone10
Tomcat=9.0.0-milestone11
Tomcat=9.0.0-milestone12
Tomcat=9.0.0-milestone13
Tomcat=9.0.0-milestone14
Tomcat=9.0.0-milestone15
Tomcat=9.0.0-milestone16
Tomcat=9.0.0-milestone17
Tomcat=9.0.0-milestone18
Tomcat=9.0.0-milestone19
Tomcat=9.0.0-milestone2
Tomcat=9.0.0-milestone20
Tomcat=9.0.0-milestone3
Tomcat=9.0.0-milestone4
Tomcat=9.0.0-milestone5
Tomcat=9.0.0-milestone6
Tomcat=9.0.0-milestone7
Tomcat=9.0.0-milestone8
Tomcat=9.0.0-milestone9
Tomcat=9.0.0-m1
Tomcat=9.0.0-m10
Tomcat=9.0.0-m11
Tomcat=9.0.0-m12
Tomcat=9.0.0-m13
Tomcat=9.0.0-m14
Tomcat=9.0.0-m15
Tomcat=9.0.0-m16
Tomcat=9.0.0-m17
Tomcat=9.0.0-m18
Tomcat=9.0.0-m19
Tomcat=9.0.0-m2
Tomcat=9.0.0-m20
Tomcat=9.0.0-m3
Tomcat=9.0.0-m4
Tomcat=9.0.0-m5
Tomcat=9.0.0-m6
Tomcat=9.0.0-m7
Tomcat=9.0.0-m8
Tomcat=9.0.0-m9

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2017-5664?

    CVE-2017-5664 has a medium severity level as it allows sensitive information disclosure to unauthorized users.

  • How do I fix CVE-2017-5664?

    To fix CVE-2017-5664, upgrade to Apache Tomcat version 7.0.78, 8.0.44, 8.5.15, or 9.0.0.M21.

  • What causes CVE-2017-5664?

    CVE-2017-5664 is caused by an improper error page handling in Apache Tomcat that can expose sensitive request and response data.

  • Which versions of Apache Tomcat are affected by CVE-2017-5664?

    Apache Tomcat versions from 7.0.0 to 7.0.77 and several versions of 8.x and 9.x are affected by CVE-2017-5664.

  • What type of vulnerability is CVE-2017-5664?

    CVE-2017-5664 is a security vulnerability related to information disclosure due to improper error page handling.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203