Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xeDZoLTk1NjctNWZxd84AAXnF
Arbitrary file write in Apache Commons Fileupload
The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
Permalink: https://github.com/advisories/GHSA-qx6h-9567-5fqwJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xeDZoLTk1NjctNWZxd84AAXnF
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: about 2 months ago
Identifiers: GHSA-qx6h-9567-5fqw, CVE-2013-2186
References:
- https://nvd.nist.gov/vuln/detail/CVE-2013-2186
- https://access.redhat.com/errata/RHSA-2016:0070
- https://exchange.xforce.ibmcloud.com/vulnerabilities/88133
- https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
- https://www.tenable.com/security/research/tra-2016-23
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html
- http://rhn.redhat.com/errata/RHSA-2013-1448.html
- http://ubuntu.com/usn/usn-2029-1
- http://www.debian.org/security/2013/dsa-2827
- http://www.securityfocus.com/bid/63174
- https://github.com/apache/commons-fileupload/blob/master/RELEASE-NOTES.txt
- https://github.com/apache/commons-fileupload/commit/163a6061fbc077d4b6e4787d26857c2baba495d1
- https://github.com/advisories/GHSA-qx6h-9567-5fqw
Blast Radius: 0.0
Affected Packages
maven:commons-fileupload:commons-fileupload
Dependent packages: 2,282Dependent repositories: 103,825
Downloads:
Affected Version Ranges: < 1.3.1
Fixed in: 1.3.1
All affected versions: 1.2.1, 1.2.2
All unaffected versions: 1.3.1, 1.3.2, 1.3.3