Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tomcat | Apache | * | 7.0.39 (including) |
Tomcat | Apache | 7.0.0 (including) | 7.0.0 (including) |
Tomcat | Apache | 7.0.0-beta (including) | 7.0.0-beta (including) |
Tomcat | Apache | 7.0.1 (including) | 7.0.1 (including) |
Tomcat | Apache | 7.0.2 (including) | 7.0.2 (including) |
Tomcat | Apache | 7.0.2-beta (including) | 7.0.2-beta (including) |
Tomcat | Apache | 7.0.3 (including) | 7.0.3 (including) |
Tomcat | Apache | 7.0.4 (including) | 7.0.4 (including) |
Tomcat | Apache | 7.0.4-beta (including) | 7.0.4-beta (including) |
Tomcat | Apache | 7.0.10 (including) | 7.0.10 (including) |
Tomcat | Apache | 7.0.11 (including) | 7.0.11 (including) |
Tomcat | Apache | 7.0.12 (including) | 7.0.12 (including) |
Tomcat | Apache | 7.0.13 (including) | 7.0.13 (including) |
Tomcat | Apache | 7.0.14 (including) | 7.0.14 (including) |
Tomcat | Apache | 7.0.15 (including) | 7.0.15 (including) |
Tomcat | Apache | 7.0.16 (including) | 7.0.16 (including) |
Tomcat | Apache | 7.0.17 (including) | 7.0.17 (including) |
Tomcat | Apache | 7.0.18 (including) | 7.0.18 (including) |
Tomcat | Apache | 7.0.19 (including) | 7.0.19 (including) |
Tomcat | Apache | 7.0.20 (including) | 7.0.20 (including) |
Tomcat | Apache | 7.0.21 (including) | 7.0.21 (including) |
Tomcat | Apache | 7.0.22 (including) | 7.0.22 (including) |
Tomcat | Apache | 7.0.23 (including) | 7.0.23 (including) |
Tomcat | Apache | 7.0.24 (including) | 7.0.24 (including) |
Tomcat | Apache | 7.0.25 (including) | 7.0.25 (including) |
Tomcat | Apache | 7.0.26 (including) | 7.0.26 (including) |
Tomcat | Apache | 7.0.27 (including) | 7.0.27 (including) |
Tomcat | Apache | 7.0.28 (including) | 7.0.28 (including) |
Tomcat | Apache | 7.0.29 (including) | 7.0.29 (including) |
Tomcat | Apache | 7.0.30 (including) | 7.0.30 (including) |
Tomcat | Apache | 7.0.31 (including) | 7.0.31 (including) |
Tomcat | Apache | 7.0.32 (including) | 7.0.32 (including) |
Tomcat | Apache | 7.0.33 (including) | 7.0.33 (including) |
Tomcat | Apache | 7.0.34 (including) | 7.0.34 (including) |
Tomcat | Apache | 7.0.35 (including) | 7.0.35 (including) |
Tomcat | Apache | 7.0.36 (including) | 7.0.36 (including) |
Tomcat | Apache | 7.0.37 (including) | 7.0.37 (including) |
Tomcat | Apache | 7.0.38 (including) | 7.0.38 (including) |
Tomcat7 | Ubuntu | precise | * |
Tomcat7 | Ubuntu | upstream | * |