Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-2186 (GCVE-0-2013-2186)
Vulnerability from cvelistv5 – Published: 2013-10-28 21:00 – Updated: 2024-08-06 15:27- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:27:40.996Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2013:1430",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1430.html"
},
{
"name": "RHSA-2013:1429",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1429.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "apache-commons-cve20132186-file-overrwite(88133)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88133"
},
{
"name": "openSUSE-SU-2013:1571",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "55716",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/55716"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "openSUSE-SU-2013:1596",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html"
},
{
"name": "SUSE-SU-2013:1660",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html"
},
{
"name": "RHSA-2013:1428",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1428.html"
},
{
"name": "DSA-2827",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2013/dsa-2827"
},
{
"name": "RHSA-2016:0070",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2016:0070"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01"
},
{
"name": "RHSA-2013:1442",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1442.html"
},
{
"name": "RHSA-2013:1448",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1448.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tenable.com/security/research/tra-2016-23"
},
{
"name": "63174",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/63174"
},
{
"name": "USN-2029-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://ubuntu.com/usn/usn-2029-1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-10-15T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-01-08T21:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2013:1430",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1430.html"
},
{
"name": "RHSA-2013:1429",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1429.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "apache-commons-cve20132186-file-overrwite(88133)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88133"
},
{
"name": "openSUSE-SU-2013:1571",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "55716",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/55716"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "openSUSE-SU-2013:1596",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html"
},
{
"name": "SUSE-SU-2013:1660",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html"
},
{
"name": "RHSA-2013:1428",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1428.html"
},
{
"name": "DSA-2827",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2013/dsa-2827"
},
{
"name": "RHSA-2016:0070",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2016:0070"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01"
},
{
"name": "RHSA-2013:1442",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1442.html"
},
{
"name": "RHSA-2013:1448",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1448.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tenable.com/security/research/tra-2016-23"
},
{
"name": "63174",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/63174"
},
{
"name": "USN-2029-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://ubuntu.com/usn/usn-2029-1"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-2186",
"datePublished": "2013-10-28T21:00:00.000Z",
"dateReserved": "2013-02-19T00:00:00.000Z",
"dateUpdated": "2024-08-06T15:27:40.996Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2013-2186",
"date": "2026-05-22",
"epss": "0.87241",
"percentile": "0.99461"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6B1CE36-5131-425D-90BD-FC597F27B3E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:cp07:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9C9C8B4-693E-4777-BC31-5933147DFC54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3451D2AD-BB7B-4149-97C3-2DB1BCC0EF85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_portal_platform:6.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC0F117C-E25C-4B0C-9459-4BB4413440CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36684290-780F-444A-8534-907C52796F6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*\", \"versionEndIncluding\": \"3.1\", \"matchCriteriaId\": \"0A492A49-052F-4CD5-AE7E-AF8A6B3E1B2D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ubuntu:ubuntu:10.04:*:lts:*:*:*:*:*\", \"matchCriteriaId\": \"C0939929-26C2-4BD4-A57A-38CCE953D47B\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.\"}, {\"lang\": \"es\", \"value\": \"La clase DiskFileItem en Apache Commons FileUpload, tal como se utiliza en Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2 y 6.0.0; y Red Hat JBoss Web Server 1.0.2 permite a atacantes remotos escribir en archivos arbitrarios a trav\\u00e9s de un byte NULL en un nombre de archivo en una instancia serializada.\"}]",
"id": "CVE-2013-2186",
"lastModified": "2024-11-21T01:51:12.450",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2013-10-28T21:55:05.157",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1428.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1429.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1430.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1442.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1448.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/55716\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://ubuntu.com/usn/usn-2029-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2013/dsa-2827\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/63174\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2016:0070\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/88133\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.tenable.com/security/research/tra-2016-23\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1428.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1429.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1430.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1442.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1448.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/55716\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://ubuntu.com/usn/usn-2029-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2013/dsa-2827\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/63174\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2016:0070\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/88133\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.tenable.com/security/research/tra-2016-23\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2013-2186\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-10-28T21:55:05.157\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.\"},{\"lang\":\"es\",\"value\":\"La clase DiskFileItem en Apache Commons FileUpload, tal como se utiliza en Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2 y 6.0.0; y Red Hat JBoss Web Server 1.0.2 permite a atacantes remotos escribir en archivos arbitrarios a trav\u00e9s de un byte NULL en un nombre de archivo en una instancia serializada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6B1CE36-5131-425D-90BD-FC597F27B3E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:cp07:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9C9C8B4-693E-4777-BC31-5933147DFC54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3451D2AD-BB7B-4149-97C3-2DB1BCC0EF85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_portal_platform:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC0F117C-E25C-4B0C-9459-4BB4413440CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36684290-780F-444A-8534-907C52796F6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*\",\"versionEndIncluding\":\"3.1\",\"matchCriteriaId\":\"0A492A49-052F-4CD5-AE7E-AF8A6B3E1B2D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu:10.04:*:lts:*:*:*:*:*\",\"matchCriteriaId\":\"C0939929-26C2-4BD4-A57A-38CCE953D47B\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1428.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1429.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1430.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1442.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1448.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/55716\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://ubuntu.com/usn/usn-2029-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2827\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/63174\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:0070\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/88133\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.tenable.com/security/research/tra-2016-23\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1428.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1429.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1430.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1442.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1448.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/55716\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://ubuntu.com/usn/usn-2029-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2827\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/63174\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:0070\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/88133\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.tenable.com/security/research/tra-2016-23\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
FKIE_CVE-2013-2186
Vulnerability from fkie_nvd - Published: 2013-10-28 21:55 - Updated: 2026-04-29 01:13| Vendor | Product | Version | |
|---|---|---|---|
| redhat | jboss_enterprise_brms_platform | 5.3.1 | |
| redhat | jboss_enterprise_portal_platform | 4.3.0 | |
| redhat | jboss_enterprise_portal_platform | 5.2.2 | |
| redhat | jboss_enterprise_portal_platform | 6.0.0 | |
| redhat | jboss_enterprise_web_server | 1.0.2 | |
| redhat | openshift | * | |
| ubuntu | ubuntu | 10.04 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6B1CE36-5131-425D-90BD-FC597F27B3E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:cp07:*:*:*:*:*:*",
"matchCriteriaId": "C9C9C8B4-693E-4777-BC31-5933147DFC54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3451D2AD-BB7B-4149-97C3-2DB1BCC0EF85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_portal_platform:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AC0F117C-E25C-4B0C-9459-4BB4413440CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "36684290-780F-444A-8534-907C52796F6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "0A492A49-052F-4CD5-AE7E-AF8A6B3E1B2D",
"versionEndIncluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ubuntu:ubuntu:10.04:*:lts:*:*:*:*:*",
"matchCriteriaId": "C0939929-26C2-4BD4-A57A-38CCE953D47B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance."
},
{
"lang": "es",
"value": "La clase DiskFileItem en Apache Commons FileUpload, tal como se utiliza en Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2 y 6.0.0; y Red Hat JBoss Web Server 1.0.2 permite a atacantes remotos escribir en archivos arbitrarios a trav\u00e9s de un byte NULL en un nombre de archivo en una instancia serializada."
}
],
"id": "CVE-2013-2186",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-10-28T21:55:05.157",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1428.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1429.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1430.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1442.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1448.html"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/55716"
},
{
"source": "secalert@redhat.com",
"url": "http://ubuntu.com/usn/usn-2029-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2013/dsa-2827"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/63174"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2016:0070"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88133"
},
{
"source": "secalert@redhat.com",
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01"
},
{
"source": "secalert@redhat.com",
"url": "https://www.tenable.com/security/research/tra-2016-23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1428.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1429.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1430.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1442.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1448.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/55716"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://ubuntu.com/usn/usn-2029-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2013/dsa-2827"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/63174"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2016:0070"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88133"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.tenable.com/security/research/tra-2016-23"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-QX6H-9567-5FQW
Vulnerability from github – Published: 2022-05-14 03:52 – Updated: 2024-03-05 17:59The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "commons-fileupload:commons-fileupload"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2013-2186"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": true,
"github_reviewed_at": "2022-11-03T21:09:29Z",
"nvd_published_at": "2013-10-28T21:55:00Z",
"severity": "HIGH"
},
"details": "The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.",
"id": "GHSA-qx6h-9567-5fqw",
"modified": "2024-03-05T17:59:41Z",
"published": "2022-05-14T03:52:43Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2186"
},
{
"type": "WEB",
"url": "https://github.com/apache/commons-fileupload/commit/163a6061fbc077d4b6e4787d26857c2baba495d1"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2016:0070"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88133"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/commons-fileupload"
},
{
"type": "WEB",
"url": "https://github.com/apache/commons-fileupload/blob/master/RELEASE-NOTES.txt"
},
{
"type": "WEB",
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01"
},
{
"type": "WEB",
"url": "https://www.tenable.com/security/research/tra-2016-23"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1448.html"
},
{
"type": "WEB",
"url": "http://ubuntu.com/usn/usn-2029-1"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2013/dsa-2827"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/63174"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Arbitrary file write in Apache Commons Fileupload"
}
GSD-2013-2186
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2013-2186",
"description": "The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.",
"id": "GSD-2013-2186",
"references": [
"https://www.suse.com/security/cve/CVE-2013-2186.html",
"https://www.debian.org/security/2013/dsa-2827",
"https://access.redhat.com/errata/RHSA-2016:0070",
"https://access.redhat.com/errata/RHSA-2013:1448",
"https://access.redhat.com/errata/RHSA-2013:1442",
"https://access.redhat.com/errata/RHSA-2013:1430",
"https://access.redhat.com/errata/RHSA-2013:1429",
"https://access.redhat.com/errata/RHSA-2013:1428"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-2186"
],
"details": "The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.",
"id": "GSD-2013-2186",
"modified": "2023-12-13T01:22:17.002218Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2186",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.tenable.com/security/research/tra-2016-23",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2016-23"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource": "MISC",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2013-1448.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1448.html"
},
{
"name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01",
"refsource": "MISC",
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource": "MISC",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html"
},
{
"name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html"
},
{
"name": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2013-1428.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1428.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2013-1429.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1429.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2013-1430.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1430.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2013-1442.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1442.html"
},
{
"name": "http://secunia.com/advisories/55716",
"refsource": "MISC",
"url": "http://secunia.com/advisories/55716"
},
{
"name": "http://ubuntu.com/usn/usn-2029-1",
"refsource": "MISC",
"url": "http://ubuntu.com/usn/usn-2029-1"
},
{
"name": "http://www.debian.org/security/2013/dsa-2827",
"refsource": "MISC",
"url": "http://www.debian.org/security/2013/dsa-2827"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "MISC",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "http://www.securityfocus.com/bid/63174",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/63174"
},
{
"name": "https://access.redhat.com/errata/RHSA-2016:0070",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2016:0070"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88133",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88133"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "[1-alpha0,1.3]",
"affected_versions": "All versions starting from 1-alpha0 up to 1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-937"
],
"date": "2018-01-08",
"description": "The DiskFileItem class in this package allows remote attackers to write to arbitrary files via a `NULL` byte in a file name in a serialized instance.",
"fixed_versions": [
"1.3.1"
],
"identifier": "CVE-2013-2186",
"identifiers": [
"CVE-2013-2186"
],
"not_impacted": "All versions before 1-alpha0, all versions after 1.3",
"package_slug": "maven/commons-fileupload/commons-fileupload",
"pubdate": "2013-10-28",
"solution": "Upgrade to version 1.3.1 or above.",
"title": "Arbitrary file upload via deserialization",
"urls": [
"https://access.redhat.com/security/cve/CVE-2013-2186",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2186"
],
"uuid": "e86fffe0-0e0f-4929-980b-227f18068586"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_portal_platform:6.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:cp07:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu:10.04:*:lts:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2186"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:1428",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1428.html"
},
{
"name": "RHSA-2013:1429",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1429.html"
},
{
"name": "RHSA-2013:1430",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1430.html"
},
{
"name": "RHSA-2013:1448",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1448.html"
},
{
"name": "USN-2029-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://ubuntu.com/usn/usn-2029-1"
},
{
"name": "55716",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/55716"
},
{
"name": "DSA-2827",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2013/dsa-2827"
},
{
"name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01",
"refsource": "CONFIRM",
"tags": [],
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "RHSA-2016:0070",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2016:0070"
},
{
"name": "63174",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/63174"
},
{
"name": "apache-commons-cve20132186-file-overrwite(88133)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88133"
},
{
"name": "https://www.tenable.com/security/research/tra-2016-23",
"refsource": "MISC",
"tags": [],
"url": "https://www.tenable.com/security/research/tra-2016-23"
},
{
"name": "RHSA-2013:1442",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1442.html"
},
{
"name": "openSUSE-SU-2013:1596",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html"
},
{
"name": "openSUSE-SU-2013:1571",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html"
},
{
"name": "SUSE-SU-2013:1660",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-01-09T02:29Z",
"publishedDate": "2013-10-28T21:55Z"
}
}
}
OPENSUSE-SU-2024:10262-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "jakarta-commons-fileupload-1.1.1-125.11 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the jakarta-commons-fileupload-1.1.1-125.11 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10262",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10262-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-2186 page",
"url": "https://www.suse.com/security/cve/CVE-2013-2186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0050 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0050/"
}
],
"title": "jakarta-commons-fileupload-1.1.1-125.11 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10262-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "jakarta-commons-fileupload-1.1.1-125.11.aarch64",
"product": {
"name": "jakarta-commons-fileupload-1.1.1-125.11.aarch64",
"product_id": "jakarta-commons-fileupload-1.1.1-125.11.aarch64"
}
},
{
"category": "product_version",
"name": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.aarch64",
"product": {
"name": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.aarch64",
"product_id": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "jakarta-commons-fileupload-1.1.1-125.11.ppc64le",
"product": {
"name": "jakarta-commons-fileupload-1.1.1-125.11.ppc64le",
"product_id": "jakarta-commons-fileupload-1.1.1-125.11.ppc64le"
}
},
{
"category": "product_version",
"name": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.ppc64le",
"product": {
"name": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.ppc64le",
"product_id": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "jakarta-commons-fileupload-1.1.1-125.11.s390x",
"product": {
"name": "jakarta-commons-fileupload-1.1.1-125.11.s390x",
"product_id": "jakarta-commons-fileupload-1.1.1-125.11.s390x"
}
},
{
"category": "product_version",
"name": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.s390x",
"product": {
"name": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.s390x",
"product_id": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "jakarta-commons-fileupload-1.1.1-125.11.x86_64",
"product": {
"name": "jakarta-commons-fileupload-1.1.1-125.11.x86_64",
"product_id": "jakarta-commons-fileupload-1.1.1-125.11.x86_64"
}
},
{
"category": "product_version",
"name": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.x86_64",
"product": {
"name": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.x86_64",
"product_id": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-fileupload-1.1.1-125.11.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.aarch64"
},
"product_reference": "jakarta-commons-fileupload-1.1.1-125.11.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-fileupload-1.1.1-125.11.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.ppc64le"
},
"product_reference": "jakarta-commons-fileupload-1.1.1-125.11.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-fileupload-1.1.1-125.11.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.s390x"
},
"product_reference": "jakarta-commons-fileupload-1.1.1-125.11.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-fileupload-1.1.1-125.11.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.x86_64"
},
"product_reference": "jakarta-commons-fileupload-1.1.1-125.11.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.aarch64"
},
"product_reference": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.ppc64le"
},
"product_reference": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.s390x"
},
"product_reference": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.x86_64"
},
"product_reference": "jakarta-commons-fileupload-javadoc-1.1.1-125.11.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-2186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-2186"
}
],
"notes": [
{
"category": "general",
"text": "The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.aarch64",
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.ppc64le",
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.s390x",
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.x86_64",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.aarch64",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.ppc64le",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.s390x",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-2186",
"url": "https://www.suse.com/security/cve/CVE-2013-2186"
},
{
"category": "external",
"summary": "SUSE Bug 846174 for CVE-2013-2186",
"url": "https://bugzilla.suse.com/846174"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.aarch64",
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.ppc64le",
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.s390x",
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.x86_64",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.aarch64",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.ppc64le",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.s390x",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2013-2186"
},
{
"cve": "CVE-2014-0050",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0050"
}
],
"notes": [
{
"category": "general",
"text": "MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop\u0027s intended exit conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.aarch64",
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.ppc64le",
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.s390x",
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.x86_64",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.aarch64",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.ppc64le",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.s390x",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0050",
"url": "https://www.suse.com/security/cve/CVE-2014-0050"
},
{
"category": "external",
"summary": "SUSE Bug 862781 for CVE-2014-0050",
"url": "https://bugzilla.suse.com/862781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.aarch64",
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.ppc64le",
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.s390x",
"openSUSE Tumbleweed:jakarta-commons-fileupload-1.1.1-125.11.x86_64",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.aarch64",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.ppc64le",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.s390x",
"openSUSE Tumbleweed:jakarta-commons-fileupload-javadoc-1.1.1-125.11.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-0050"
}
]
}
OPENSUSE-SU-2024:10620-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "apache-commons-fileupload-1.4-1.9 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the apache-commons-fileupload-1.4-1.9 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10620",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10620-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-2186 page",
"url": "https://www.suse.com/security/cve/CVE-2013-2186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0050 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0050/"
}
],
"title": "apache-commons-fileupload-1.4-1.9 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10620-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-fileupload-1.4-1.9.aarch64",
"product": {
"name": "apache-commons-fileupload-1.4-1.9.aarch64",
"product_id": "apache-commons-fileupload-1.4-1.9.aarch64"
}
},
{
"category": "product_version",
"name": "apache-commons-fileupload-javadoc-1.4-1.9.aarch64",
"product": {
"name": "apache-commons-fileupload-javadoc-1.4-1.9.aarch64",
"product_id": "apache-commons-fileupload-javadoc-1.4-1.9.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-fileupload-1.4-1.9.ppc64le",
"product": {
"name": "apache-commons-fileupload-1.4-1.9.ppc64le",
"product_id": "apache-commons-fileupload-1.4-1.9.ppc64le"
}
},
{
"category": "product_version",
"name": "apache-commons-fileupload-javadoc-1.4-1.9.ppc64le",
"product": {
"name": "apache-commons-fileupload-javadoc-1.4-1.9.ppc64le",
"product_id": "apache-commons-fileupload-javadoc-1.4-1.9.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-fileupload-1.4-1.9.s390x",
"product": {
"name": "apache-commons-fileupload-1.4-1.9.s390x",
"product_id": "apache-commons-fileupload-1.4-1.9.s390x"
}
},
{
"category": "product_version",
"name": "apache-commons-fileupload-javadoc-1.4-1.9.s390x",
"product": {
"name": "apache-commons-fileupload-javadoc-1.4-1.9.s390x",
"product_id": "apache-commons-fileupload-javadoc-1.4-1.9.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-fileupload-1.4-1.9.x86_64",
"product": {
"name": "apache-commons-fileupload-1.4-1.9.x86_64",
"product_id": "apache-commons-fileupload-1.4-1.9.x86_64"
}
},
{
"category": "product_version",
"name": "apache-commons-fileupload-javadoc-1.4-1.9.x86_64",
"product": {
"name": "apache-commons-fileupload-javadoc-1.4-1.9.x86_64",
"product_id": "apache-commons-fileupload-javadoc-1.4-1.9.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-fileupload-1.4-1.9.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.aarch64"
},
"product_reference": "apache-commons-fileupload-1.4-1.9.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-fileupload-1.4-1.9.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.ppc64le"
},
"product_reference": "apache-commons-fileupload-1.4-1.9.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-fileupload-1.4-1.9.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.s390x"
},
"product_reference": "apache-commons-fileupload-1.4-1.9.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-fileupload-1.4-1.9.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.x86_64"
},
"product_reference": "apache-commons-fileupload-1.4-1.9.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-fileupload-javadoc-1.4-1.9.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.aarch64"
},
"product_reference": "apache-commons-fileupload-javadoc-1.4-1.9.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-fileupload-javadoc-1.4-1.9.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.ppc64le"
},
"product_reference": "apache-commons-fileupload-javadoc-1.4-1.9.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-fileupload-javadoc-1.4-1.9.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.s390x"
},
"product_reference": "apache-commons-fileupload-javadoc-1.4-1.9.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-fileupload-javadoc-1.4-1.9.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.x86_64"
},
"product_reference": "apache-commons-fileupload-javadoc-1.4-1.9.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-2186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-2186"
}
],
"notes": [
{
"category": "general",
"text": "The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.aarch64",
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.ppc64le",
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.s390x",
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.x86_64",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.aarch64",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.ppc64le",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.s390x",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-2186",
"url": "https://www.suse.com/security/cve/CVE-2013-2186"
},
{
"category": "external",
"summary": "SUSE Bug 846174 for CVE-2013-2186",
"url": "https://bugzilla.suse.com/846174"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.aarch64",
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.ppc64le",
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.s390x",
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.x86_64",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.aarch64",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.ppc64le",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.s390x",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2013-2186"
},
{
"cve": "CVE-2014-0050",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0050"
}
],
"notes": [
{
"category": "general",
"text": "MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop\u0027s intended exit conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.aarch64",
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.ppc64le",
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.s390x",
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.x86_64",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.aarch64",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.ppc64le",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.s390x",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0050",
"url": "https://www.suse.com/security/cve/CVE-2014-0050"
},
{
"category": "external",
"summary": "SUSE Bug 862781 for CVE-2014-0050",
"url": "https://bugzilla.suse.com/862781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.aarch64",
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.ppc64le",
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.s390x",
"openSUSE Tumbleweed:apache-commons-fileupload-1.4-1.9.x86_64",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.aarch64",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.ppc64le",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.s390x",
"openSUSE Tumbleweed:apache-commons-fileupload-javadoc-1.4-1.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-0050"
}
]
}
RHSA-2013:1428
Vulnerability from csaf_redhat - Published: 2013-10-15 18:18 - Updated: 2026-05-14 22:17The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEWS-1:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.src | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated jakarta-commons-fileupload package that fixes one security issue\nis now available for Red Hat JBoss Web Server 1.0.2 for Red Hat Enterprise\nLinux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache Commons FileUpload component can be used to add a file upload\ncapability to your applications.\n\nA flaw was found in the way the DiskFileItem class handled NULL characters\nin file names. A remote attacker able to supply a serialized instance of\nthe DiskFileItem class, which will be deserialized on a server, could use\nthis flaw to write arbitrary content to any location on the server that is\naccessible to the user running the application server process.\n(CVE-2013-2186)\n\nWarning: Before applying the update, back up your existing Red Hat\nJBoss Enterprise Web Server installation (including all applications and\nconfiguration files).\n\nAll users of Red Hat JBoss Web Server 1.0.2 on Red Hat Enterprise Linux\n5 and 6 are advised to upgrade to this updated package. The JBoss server\nprocess must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1428",
"url": "https://access.redhat.com/errata/RHSA-2013:1428"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "974814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=974814"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1428.json"
}
],
"title": "Red Hat Security Advisory: jakarta-commons-fileupload security update",
"tracking": {
"current_release_date": "2026-05-14T22:17:05+00:00",
"generator": {
"date": "2026-05-14T22:17:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2013:1428",
"initial_release_date": "2013-10-15T18:18:00+00:00",
"revision_history": [
{
"date": "2013-10-15T18:18:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-10-15T18:22:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:17:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.noarch",
"product": {
"name": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.noarch",
"product_id": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-fileupload@1.1.1-7.7.ep5.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.noarch",
"product": {
"name": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.noarch",
"product_id": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-fileupload@1.1.1-7.7.ep5.el6?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.src",
"product": {
"name": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.src",
"product_id": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-fileupload@1.1.1-7.7.ep5.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.src",
"product": {
"name": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.src",
"product_id": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-fileupload@1.1.1-7.7.ep5.el6?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.noarch"
},
"product_reference": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.src"
},
"product_reference": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.noarch"
},
"product_reference": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEWS-1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server",
"product_id": "6Server-JBEWS-1:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.src"
},
"product_reference": "jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEWS-1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-2186",
"cwe": {
"id": "CWE-626",
"name": "Null Byte Interaction Error (Poison Null Byte)"
},
"discovery_date": "2013-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "974814"
}
],
"notes": [
{
"category": "description",
"text": "The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "commons-fileupload: Arbitrary file upload via deserialization",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.src",
"6Server-JBEWS-1:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.noarch",
"6Server-JBEWS-1:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2186"
},
{
"category": "external",
"summary": "RHBZ#974814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=974814"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2186",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2186"
}
],
"release_date": "2013-10-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-15T18:18:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Server-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.src",
"6Server-JBEWS-1:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.noarch",
"6Server-JBEWS-1:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1428"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.noarch",
"5Server-JBEWS-5.0.0:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el5.src",
"6Server-JBEWS-1:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.noarch",
"6Server-JBEWS-1:jakarta-commons-fileupload-1:1.1.1-7.7.ep5.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "commons-fileupload: Arbitrary file upload via deserialization"
}
]
}
RHSA-2013:1429
Vulnerability from csaf_redhat - Published: 2013-10-15 18:30 - Updated: 2026-05-14 22:17The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Web Server 1.0
Red Hat / Red Hat JBoss Web Server
|
cpe:/a:redhat:jboss_enterprise_web_server:1.0.2
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat JBoss Web Server 1.0.2 that fixes one security issue\nis now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache Commons FileUpload component can be used to add a file upload\ncapability to your applications.\n\nA flaw was found in the way the DiskFileItem class handled NULL characters\nin file names. A remote attacker able to supply a serialized instance of\nthe DiskFileItem class, which will be deserialized on a server, could use\nthis flaw to write arbitrary content to any location on the server that is\naccessible to the user running the application server process.\n(CVE-2013-2186)\n\nAll users of Red Hat JBoss Web Server 1.0.2 as provided from the Red Hat\nCustomer Portal are advised to apply this update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1429",
"url": "https://access.redhat.com/errata/RHSA-2013:1429"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=1.0.2",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=1.0.2"
},
{
"category": "external",
"summary": "974814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=974814"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1429.json"
}
],
"title": "Red Hat Security Advisory: jakarta-commons-fileupload security update",
"tracking": {
"current_release_date": "2026-05-14T22:17:05+00:00",
"generator": {
"date": "2026-05-14T22:17:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2013:1429",
"initial_release_date": "2013-10-15T18:30:00+00:00",
"revision_history": [
{
"date": "2013-10-15T18:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-02-20T12:31:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:17:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0",
"product": {
"name": "Red Hat JBoss Web Server 1.0",
"product_id": "Red Hat JBoss Web Server 1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1.0.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-2186",
"cwe": {
"id": "CWE-626",
"name": "Null Byte Interaction Error (Poison Null Byte)"
},
"discovery_date": "2013-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "974814"
}
],
"notes": [
{
"category": "description",
"text": "The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "commons-fileupload: Arbitrary file upload via deserialization",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2186"
},
{
"category": "external",
"summary": "RHBZ#974814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=974814"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2186",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2186"
}
],
"release_date": "2013-10-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-15T18:30:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe JBoss server process must be restarted for the update to take effect.",
"product_ids": [
"Red Hat JBoss Web Server 1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1429"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Web Server 1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "commons-fileupload: Arbitrary file upload via deserialization"
}
]
}
RHSA-2013:1430
Vulnerability from csaf_redhat - Published: 2013-10-15 18:31 - Updated: 2026-05-14 22:17The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
JBoss Enterprise BRMS Platform 5.3
Red Hat / Red Hat JBoss Middleware
|
cpe:/a:redhat:jboss_enterprise_brms_platform:5.3.1
|
— |
Vendor Fix
fix
|
|
Red Hat JBoss Portal 4.3
Red Hat / Red Hat JBoss Middleware
|
cpe:/a:redhat:jboss_enterprise_portal_platform:4.3.0:update7
|
— |
Vendor Fix
fix
|
|
Red Hat JBoss Portal 5.2
Red Hat / Red Hat JBoss Middleware
|
cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2
|
— |
Vendor Fix
fix
|
|
Red Hat JBoss Portal Platform 6.0
Red Hat / Red Hat JBoss Middleware
|
cpe:/a:redhat:jboss_enterprise_portal_platform:6.0.0
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the commons-fileupload component that fixes one security\nissue is now available from the Red Hat Customer Portal for Red Hat JBoss\nBRMS 5.3.1; and Red Hat JBoss Portal 4.3 CP07, 5.2.2 and 6.0.0.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache Commons FileUpload component can be used to add a file upload\ncapability to your applications.\n\nA flaw was found in the way the DiskFileItem class handled NULL characters\nin file names. A remote attacker able to supply a serialized instance of\nthe DiskFileItem class, which will be deserialized on a server, could use\nthis flaw to write arbitrary content to any location on the server that is\naccessible to the user running the application server process.\n(CVE-2013-2186)\n\nAll users of the affected products as provided from the Red Hat Customer\nPortal are advised to apply this update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1430",
"url": "https://access.redhat.com/errata/RHSA-2013:1430"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=5.3.1",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=5.3.1"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=securityPatches\u0026version=4.3+CP07",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=securityPatches\u0026version=4.3+CP07"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=securityPatches\u0026version=5.2.2",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=securityPatches\u0026version=5.2.2"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=securityPatches\u0026version=6.0.0",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=securityPatches\u0026version=6.0.0"
},
{
"category": "external",
"summary": "974814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=974814"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1430.json"
}
],
"title": "Red Hat Security Advisory: commons-fileupload security update",
"tracking": {
"current_release_date": "2026-05-14T22:17:13+00:00",
"generator": {
"date": "2026-05-14T22:17:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2013:1430",
"initial_release_date": "2013-10-15T18:31:00+00:00",
"revision_history": [
{
"date": "2013-10-15T18:31:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-06-15T16:41:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:17:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "JBoss Enterprise BRMS Platform 5.3",
"product": {
"name": "JBoss Enterprise BRMS Platform 5.3",
"product_id": "JBoss Enterprise BRMS Platform 5.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_brms_platform:5.3.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Portal 4.3",
"product": {
"name": "Red Hat JBoss Portal 4.3",
"product_id": "Red Hat JBoss Portal 4.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_portal_platform:4.3.0:update7"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Portal 5.2",
"product": {
"name": "Red Hat JBoss Portal 5.2",
"product_id": "Red Hat JBoss Portal 5.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Portal Platform 6.0",
"product": {
"name": "Red Hat JBoss Portal Platform 6.0",
"product_id": "Red Hat JBoss Portal Platform 6.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_portal_platform:6.0.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Middleware"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-2186",
"cwe": {
"id": "CWE-626",
"name": "Null Byte Interaction Error (Poison Null Byte)"
},
"discovery_date": "2013-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "974814"
}
],
"notes": [
{
"category": "description",
"text": "The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "commons-fileupload: Arbitrary file upload via deserialization",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBoss Enterprise BRMS Platform 5.3",
"Red Hat JBoss Portal 4.3",
"Red Hat JBoss Portal 5.2",
"Red Hat JBoss Portal Platform 6.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2186"
},
{
"category": "external",
"summary": "RHBZ#974814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=974814"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2186",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2186"
}
],
"release_date": "2013-10-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-15T18:31:00+00:00",
"details": "The References section of this erratum contains download links (you must\nlog in to download the update). Before applying this update, back up your\nexisting Red Hat JBoss BRMS installation (including all applications and\nconfiguration files). For Red Hat JBoss Portal, back up all deployed\napplications, along with all customized configuration files, and any\ndatabases and database settings.\n\nNote that it is recommended to halt the JBoss Enterprise BRMS Platform\nserver and the Red Hat JBoss Portal server by stopping the JBoss\nApplication Server process before installing this update, and then after\ninstalling the update, restart the JBoss Enterprise BRMS Platform server by\nstarting the JBoss Application Server process.",
"product_ids": [
"JBoss Enterprise BRMS Platform 5.3",
"Red Hat JBoss Portal 4.3",
"Red Hat JBoss Portal 5.2",
"Red Hat JBoss Portal Platform 6.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1430"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"JBoss Enterprise BRMS Platform 5.3",
"Red Hat JBoss Portal 4.3",
"Red Hat JBoss Portal 5.2",
"Red Hat JBoss Portal Platform 6.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "commons-fileupload: Arbitrary file upload via deserialization"
}
]
}
RHSA-2013:1442
Vulnerability from csaf_redhat - Published: 2013-10-17 17:17 - Updated: 2026-05-14 22:17The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss SOA Platform 4.3
Red Hat / Red Hat JBoss SOA Platform
|
cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:update5
|
— |
Vendor Fix
fix
|
|
Red Hat JBoss SOA Platform 5.3
Red Hat / Red Hat JBoss SOA Platform
|
cpe:/a:redhat:jboss_enterprise_soa_platform:5.3.1
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the commons-fileupload component that fixes one security\nissue is now available from the Red Hat Customer Portal for Red Hat JBoss\nSOA Platform 4.3.0.GA_CP05 and 5.3.1 GA.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache Commons FileUpload component can be used to add a file upload\ncapability to your applications.\n\nA flaw was found in the way the DiskFileItem class handled NULL characters\nin file names. A remote attacker able to supply a serialized instance of\nthe DiskFileItem class, which will be deserialized on a server, could use\nthis flaw to write arbitrary content to any location on the server that is\naccessible to the user running the application server process.\n(CVE-2013-2186)\n\nAll users of the affected products as provided from the Red Hat Customer\nPortal are advised to apply this update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1442",
"url": "https://access.redhat.com/errata/RHSA-2013:1442"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=securityPatches\u0026version=4.3.0.GA_CP05",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=securityPatches\u0026version=4.3.0.GA_CP05"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=securityPatches\u0026version=5.3.1+GA",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=securityPatches\u0026version=5.3.1+GA"
},
{
"category": "external",
"summary": "974814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=974814"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1442.json"
}
],
"title": "Red Hat Security Advisory: commons-fileupload security update",
"tracking": {
"current_release_date": "2026-05-14T22:17:13+00:00",
"generator": {
"date": "2026-05-14T22:17:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2013:1442",
"initial_release_date": "2013-10-17T17:17:00+00:00",
"revision_history": [
{
"date": "2013-10-17T17:17:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-02-20T12:30:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:17:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss SOA Platform 4.3",
"product": {
"name": "Red Hat JBoss SOA Platform 4.3",
"product_id": "Red Hat JBoss SOA Platform 4.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:update5"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss SOA Platform 5.3",
"product": {
"name": "Red Hat JBoss SOA Platform 5.3",
"product_id": "Red Hat JBoss SOA Platform 5.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss SOA Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-2186",
"cwe": {
"id": "CWE-626",
"name": "Null Byte Interaction Error (Poison Null Byte)"
},
"discovery_date": "2013-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "974814"
}
],
"notes": [
{
"category": "description",
"text": "The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "commons-fileupload: Arbitrary file upload via deserialization",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss SOA Platform 4.3",
"Red Hat JBoss SOA Platform 5.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2186"
},
{
"category": "external",
"summary": "RHBZ#974814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=974814"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2186",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2186"
}
],
"release_date": "2013-10-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-17T17:17:00+00:00",
"details": "The References section of this erratum contains download links (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss SOA Platform installation (including its databases,\napplications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss SOA Platform server\nby stopping the JBoss Application Server process before installing this\nupdate. After installing the update, restart the Red Hat JBoss SOA Platform\nserver by starting the JBoss Application Server process.",
"product_ids": [
"Red Hat JBoss SOA Platform 4.3",
"Red Hat JBoss SOA Platform 5.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1442"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss SOA Platform 4.3",
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "commons-fileupload: Arbitrary file upload via deserialization"
}
]
}
RHSA-2013:1448
Vulnerability from csaf_redhat - Published: 2013-10-21 17:22 - Updated: 2026-05-14 22:17The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Operations Network 3.1
Red Hat / Red Hat JBoss Operations Network
|
cpe:/a:redhat:jboss_operations_network:3.1.2
|
— |
Vendor Fix
fix
|
The org.jboss.remoting.transport.socket.ServerThread class in Red Hat JBoss Remoting for Red Hat JBoss SOA Platform 5.3.1 GA, Web Platform 5.2.0, Enterprise Application Platform 5.2.0, and other products allows remote attackers to cause a denial of service (file descriptor consumption) via unspecified vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Operations Network 3.1
Red Hat / Red Hat JBoss Operations Network
|
cpe:/a:redhat:jboss_operations_network:3.1.2
|
— |
Vendor Fix
fix
|
The server in Red Hat JBoss Operations Network (JON) 3.1.2 logs passwords in plaintext, which allows local users to obtain sensitive information by reading the log files.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Operations Network 3.1
Red Hat / Red Hat JBoss Operations Network
|
cpe:/a:redhat:jboss_operations_network:3.1.2
|
— |
Vendor Fix
fix
|
The storeFiles method in JPADriftServerBean in Red Hat JBoss Operations Network (JON) 3.1.2 allows local users to load arbitrary drift files into a server by writing the files to the temporary directory that is used to unpack zip files.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss Operations Network 3.1
Red Hat / Red Hat JBoss Operations Network
|
cpe:/a:redhat:jboss_operations_network:3.1.2
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat JBoss Operations Network 3.1.2 that fixes multiple\nsecurity issues is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Operations Network is a middleware management solution that\nprovides a single point of control to deploy, manage, and monitor JBoss\nEnterprise Middleware, applications, and services.\n\nA flaw was found in the way the DiskFileItem class handled NULL characters\nin file names. A remote attacker able to supply a serialized instance of\nthe DiskFileItem class, which will be deserialized on a server, could use\nthis flaw to write arbitrary content to any location on the server that is\naccessible to the user running the application server process.\n(CVE-2013-2186)\n\nA denial of service flaw was found in the implementation of the\norg.jboss.remoting.transport.socket.ServerThread class in JBoss\nRemoting. An attacker could use this flaw to exhaust all available file\ndescriptors on the target server, preventing legitimate connections. Note\nthat to exploit this flaw remotely, the remoting port must be exposed\ndirectly or indirectly (for example, deploying a public facing application\nthat uses JBoss Remoting could indirectly expose this flaw).\n(CVE-2013-4210)\n\nIt was found that the JBoss Operations Network server exposed configured\npasswords in plain text in its log files by default. A local user with\naccess to these log files could use the exposed credentials.\n(CVE-2013-4293)\n\nA flaw was found in the way JPADriftServerBean instances stored drift\nfiles. The storeFiles method created a predictable temporary directory when\nunpacking a zip file. Once a zip file was extracted to the temporary\ndirectory, all files in this directory were stored. A local attacker could\nprovide their own drift files to be imported into the server instance.\n(CVE-2013-4373)\n\nThe CVE-2013-4293 was discovered by Larry O\u0027Leary of the Red Hat Middleware\nSupport Engineering Group, and CVE-2013-4210 was discovered by James\nLivingston of the Red Hat Support Engineering Group.\n\nAll users of JBoss Operations Network 3.1.2 as provided from the Red Hat\nCustomer Portal are advised to apply this update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1448",
"url": "https://access.redhat.com/errata/RHSA-2013:1448"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=em\u0026downloadType=securityPatches\u0026version=3.1.2",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=em\u0026downloadType=securityPatches\u0026version=3.1.2"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/Red_Hat_JBoss_Operations_Network/",
"url": "https://access.redhat.com/site/documentation/Red_Hat_JBoss_Operations_Network/"
},
{
"category": "external",
"summary": "974814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=974814"
},
{
"category": "external",
"summary": "994321",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=994321"
},
{
"category": "external",
"summary": "1002853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1002853"
},
{
"category": "external",
"summary": "1011824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1011824"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1448.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Operations Network 3.1.2 update",
"tracking": {
"current_release_date": "2026-05-14T22:17:08+00:00",
"generator": {
"date": "2026-05-14T22:17:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2013:1448",
"initial_release_date": "2013-10-21T17:22:00+00:00",
"revision_history": [
{
"date": "2013-10-21T17:22:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-02-04T23:20:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:17:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Operations Network 3.1",
"product": {
"name": "Red Hat JBoss Operations Network 3.1",
"product_id": "Red Hat JBoss Operations Network 3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_operations_network:3.1.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Operations Network"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-2186",
"cwe": {
"id": "CWE-626",
"name": "Null Byte Interaction Error (Poison Null Byte)"
},
"discovery_date": "2013-06-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "974814"
}
],
"notes": [
{
"category": "description",
"text": "The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "commons-fileupload: Arbitrary file upload via deserialization",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Operations Network 3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2186"
},
{
"category": "external",
"summary": "RHBZ#974814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=974814"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2186",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2186"
}
],
"release_date": "2013-10-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-21T17:22:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting JBoss Operations Network installation (including its databases,\napplications, configuration files, the JBoss Operations Network server\u0027s\nfile system directory, and so on).\n\nNote: This update provides fixes for the server, agent, and core GUI\ncomponents of Red Hat JBoss Operations Network. It is recommended to apply\nall the patches provided by this update.\n\nRefer to the JBoss Operations Network 3.1.2 Release Notes for installation\ninformation.",
"product_ids": [
"Red Hat JBoss Operations Network 3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1448"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Operations Network 3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "commons-fileupload: Arbitrary file upload via deserialization"
},
{
"acknowledgments": [
{
"names": [
"James Livingston"
],
"organization": "Red Hat Support Engineering Group",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2013-4210",
"discovery_date": "2013-07-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "994321"
}
],
"notes": [
{
"category": "description",
"text": "The org.jboss.remoting.transport.socket.ServerThread class in Red Hat JBoss Remoting for Red Hat JBoss SOA Platform 5.3.1 GA, Web Platform 5.2.0, Enterprise Application Platform 5.2.0, and other products allows remote attackers to cause a denial of service (file descriptor consumption) via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Remoting: DoS by file descriptor exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Operations Network 3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4210"
},
{
"category": "external",
"summary": "RHBZ#994321",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=994321"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4210",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4210"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4210",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4210"
}
],
"release_date": "2013-09-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-21T17:22:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting JBoss Operations Network installation (including its databases,\napplications, configuration files, the JBoss Operations Network server\u0027s\nfile system directory, and so on).\n\nNote: This update provides fixes for the server, agent, and core GUI\ncomponents of Red Hat JBoss Operations Network. It is recommended to apply\nall the patches provided by this update.\n\nRefer to the JBoss Operations Network 3.1.2 Release Notes for installation\ninformation.",
"product_ids": [
"Red Hat JBoss Operations Network 3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1448"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Operations Network 3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Remoting: DoS by file descriptor exhaustion"
},
{
"acknowledgments": [
{
"names": [
"Larry O\u0027Leary"
],
"organization": "Red Hat Middleware Support Engineering Group",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2013-4293",
"discovery_date": "2013-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1002853"
}
],
"notes": [
{
"category": "description",
"text": "The server in Red Hat JBoss Operations Network (JON) 3.1.2 logs passwords in plaintext, which allows local users to obtain sensitive information by reading the log files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Server: Plaintext passwords in server logs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Operations Network 3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4293"
},
{
"category": "external",
"summary": "RHBZ#1002853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1002853"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4293"
}
],
"release_date": "2013-10-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-21T17:22:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting JBoss Operations Network installation (including its databases,\napplications, configuration files, the JBoss Operations Network server\u0027s\nfile system directory, and so on).\n\nNote: This update provides fixes for the server, agent, and core GUI\ncomponents of Red Hat JBoss Operations Network. It is recommended to apply\nall the patches provided by this update.\n\nRefer to the JBoss Operations Network 3.1.2 Release Notes for installation\ninformation.",
"product_ids": [
"Red Hat JBoss Operations Network 3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1448"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss Operations Network 3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Server: Plaintext passwords in server logs"
},
{
"cve": "CVE-2013-4373",
"cwe": {
"id": "CWE-377",
"name": "Insecure Temporary File"
},
"discovery_date": "2013-09-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1011824"
}
],
"notes": [
{
"category": "description",
"text": "The storeFiles method in JPADriftServerBean in Red Hat JBoss Operations Network (JON) 3.1.2 allows local users to load arbitrary drift files into a server by writing the files to the temporary directory that is used to unpack zip files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Drift: Malicious drift file import due to insecure temporary file usage",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Operations Network 3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4373"
},
{
"category": "external",
"summary": "RHBZ#1011824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1011824"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4373"
}
],
"release_date": "2013-10-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-21T17:22:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting JBoss Operations Network installation (including its databases,\napplications, configuration files, the JBoss Operations Network server\u0027s\nfile system directory, and so on).\n\nNote: This update provides fixes for the server, agent, and core GUI\ncomponents of Red Hat JBoss Operations Network. It is recommended to apply\nall the patches provided by this update.\n\nRefer to the JBoss Operations Network 3.1.2 Release Notes for installation\ninformation.",
"product_ids": [
"Red Hat JBoss Operations Network 3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1448"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.2,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Operations Network 3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Drift: Malicious drift file import due to insecure temporary file usage"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.