// For flags

CVE-2011-2729

jakarta-commons-daemon: jsvc does not drop capabilities allowing access to files and directories owned by the superuser

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application.

native/unix/native/jsvc-unix.c en jsvc en el componente Daemon v1.0.3 hasta v1.0.6 en Apache Commons, usado en Apache Tomcat v5.5.32 hasta v5.5.33, v6.0.30 hasta v6.0.32, y v7.0.x anterior a v7.0.20 en LinuxApache Commons, no elimina permisos, lo que permite a atacantes remotos evitar permisos de lectura para ficheros a través de una petición en una aplicación.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-07-11 CVE Reserved
  • 2011-08-12 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (31)
URL Tag Source
http://mail-archives.apache.org/mod_mbox/commons-dev/201108.mbox/%3C4E451B2B.9090108%40apache.org%3E Mailing List
http://mail-archives.apache.org/mod_mbox/tomcat-announce/201108.mbox/%3C4E45221D.1020306%40apache.org%3E Mailing List
http://people.apache.org/~markt/patches/2011-08-12-cve2011-2729-tc5.patch X_refsource_confirm
http://secunia.com/advisories/46030 Third Party Advisory
http://secunia.com/advisories/57126 Third Party Advisory
http://securitytracker.com/id?1025925 Vdb Entry
http://svn.apache.org/viewvc?view=revision&revision=1152701 X_refsource_confirm
http://svn.apache.org/viewvc?view=revision&revision=1153379 X_refsource_confirm
http://svn.apache.org/viewvc?view=revision&revision=1153824 X_refsource_confirm
http://www.securityfocus.com/archive/1/519263/100/0/threaded Mailing List
http://www.securityfocus.com/bid/49143 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/69161 Vdb Entry
https://issues.apache.org/jira/browse/DAEMON-214 X_refsource_confirm
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E Mailing List
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14743 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19450 Signature
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Apache Commons Daemon
Search vendor "Apache" for product "Apache Commons Daemon"
1.0.3
Search vendor "Apache" for product "Apache Commons Daemon" and version "1.0.3"
-
Safe
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Apache Commons Daemon
Search vendor "Apache" for product "Apache Commons Daemon"
1.0.4
Search vendor "Apache" for product "Apache Commons Daemon" and version "1.0.4"
-
Safe
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Apache Commons Daemon
Search vendor "Apache" for product "Apache Commons Daemon"
1.0.5
Search vendor "Apache" for product "Apache Commons Daemon" and version "1.0.5"
-
Safe
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Apache Commons Daemon
Search vendor "Apache" for product "Apache Commons Daemon"
1.0.6
Search vendor "Apache" for product "Apache Commons Daemon" and version "1.0.6"
-
Safe
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
5.5.32
Search vendor "Apache" for product "Tomcat" and version "5.5.32"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
5.5.33
Search vendor "Apache" for product "Tomcat" and version "5.5.33"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Apache Commons Daemon
Search vendor "Apache" for product "Apache Commons Daemon"
1.0.3
Search vendor "Apache" for product "Apache Commons Daemon" and version "1.0.3"
-
Safe
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Apache Commons Daemon
Search vendor "Apache" for product "Apache Commons Daemon"
1.0.4
Search vendor "Apache" for product "Apache Commons Daemon" and version "1.0.4"
-
Safe
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Apache Commons Daemon
Search vendor "Apache" for product "Apache Commons Daemon"
1.0.5
Search vendor "Apache" for product "Apache Commons Daemon" and version "1.0.5"
-
Safe
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Apache Commons Daemon
Search vendor "Apache" for product "Apache Commons Daemon"
1.0.6
Search vendor "Apache" for product "Apache Commons Daemon" and version "1.0.6"
-
Safe
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
6.0.30
Search vendor "Apache" for product "Tomcat" and version "6.0.30"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
6.0.31
Search vendor "Apache" for product "Tomcat" and version "6.0.31"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
6.0.32
Search vendor "Apache" for product "Tomcat" and version "6.0.32"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Apache Commons Daemon
Search vendor "Apache" for product "Apache Commons Daemon"
1.0.3
Search vendor "Apache" for product "Apache Commons Daemon" and version "1.0.3"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Apache Commons Daemon
Search vendor "Apache" for product "Apache Commons Daemon"
1.0.4
Search vendor "Apache" for product "Apache Commons Daemon" and version "1.0.4"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Apache Commons Daemon
Search vendor "Apache" for product "Apache Commons Daemon"
1.0.5
Search vendor "Apache" for product "Apache Commons Daemon" and version "1.0.5"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Apache Commons Daemon
Search vendor "Apache" for product "Apache Commons Daemon"
1.0.6
Search vendor "Apache" for product "Apache Commons Daemon" and version "1.0.6"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.0
Search vendor "Apache" for product "Tomcat" and version "7.0.0"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.0
Search vendor "Apache" for product "Tomcat" and version "7.0.0"
beta
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.1
Search vendor "Apache" for product "Tomcat" and version "7.0.1"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.2
Search vendor "Apache" for product "Tomcat" and version "7.0.2"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.3
Search vendor "Apache" for product "Tomcat" and version "7.0.3"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.4
Search vendor "Apache" for product "Tomcat" and version "7.0.4"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.5
Search vendor "Apache" for product "Tomcat" and version "7.0.5"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.6
Search vendor "Apache" for product "Tomcat" and version "7.0.6"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.7
Search vendor "Apache" for product "Tomcat" and version "7.0.7"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.8
Search vendor "Apache" for product "Tomcat" and version "7.0.8"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.9
Search vendor "Apache" for product "Tomcat" and version "7.0.9"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.10
Search vendor "Apache" for product "Tomcat" and version "7.0.10"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.11
Search vendor "Apache" for product "Tomcat" and version "7.0.11"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.12
Search vendor "Apache" for product "Tomcat" and version "7.0.12"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.13
Search vendor "Apache" for product "Tomcat" and version "7.0.13"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.14
Search vendor "Apache" for product "Tomcat" and version "7.0.14"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.16
Search vendor "Apache" for product "Tomcat" and version "7.0.16"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.17
Search vendor "Apache" for product "Tomcat" and version "7.0.17"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
7.0.19
Search vendor "Apache" for product "Tomcat" and version "7.0.19"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe