"The version of Apache Tomcat installed on the remote host is 7.0.x prior to 7.0.82. It is, therefore, affected by an unspecified vulnerability when running on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialization parameter of the Default to false) makes it possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. Note that Nessus has not attempted to exploit this issue but has instead relied only on the application's self-reported version number."
时间: 2024-02-14 16:22:22 浏览: 365
这同样是一个漏洞扫描报告的输出,指出远程主机上运行的 Apache Tomcat 服务器版本是 7.0.x,且在 Windows 操作系统上启用了 HTTP PUTs 功能(例如将 Default 的 readonly 初始化参数设置为 false),存在一个未公开的漏洞。攻击者可以通过特殊构造的请求上传一个 JSP 文件到服务器上,然后请求该 JSP 文件,服务器会执行其中的代码。建议立即升级到已修复漏洞的版本 7.0.82,或者禁用 HTTP PUTs 功能来避免被攻击。
阅读全文