Arbitrary JSP Code Execution Vulnerability in HiveManager Classic 8.1r1

Arbitrary JSP Code Execution Vulnerability in HiveManager Classic 8.1r1

CVE-2017-14105 · HIGH Severity

AV:L/AC:L/AU:N/C:C/I:C/A:C

HiveManager Classic through 8.1r1 allows arbitrary JSP code execution by modifying a backup archive before a restore, because the restore feature does not validate pathnames within the archive. An authenticated, local attacker - even restricted as a tenant - can add a jsp at HiveManager/tomcat/webapps/hm/domains/$yourtenant/maps (it will be exposed at the web interface).

Learn more about our Cis Benchmark Audit For Apache Tomcat.