CVE-2013-2186
commons-fileupload: Arbitrary file upload via deserialization
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
La clase DiskFileItem en Apache Commons FileUpload, tal como se utiliza en Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2 y 6.0.0; y Red Hat JBoss Web Server 1.0.2 permite a atacantes remotos escribir en archivos arbitrarios a través de un byte NULL en un nombre de archivo en una instancia serializada.
The Apache Commons FileUpload component can be used to add a file upload capability to your applications. A flaw was found in the way the DiskFileItem class handled NULL characters in file names. A remote attacker able to supply a serialized instance of the DiskFileItem class, which will be deserialized on a server, could use this flaw to write arbitrary content to any location on the server that is accessible to the user running the application server process. All users of Red Hat JBoss Web Server 1.0.2 as provided from the Red Hat Customer Portal are advised to apply this update.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-02-19 CVE Reserved
- 2013-10-16 CVE Published
- 2019-04-25 First Exploit
- 2024-08-06 CVE Updated
- 2025-03-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
- CWE-626: Null Byte Interaction Error (Poison Null Byte)
CAPEC
References (23)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/55716 | Third Party Advisory | |
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html | X_refsource_confirm |
|
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | X_refsource_confirm |
|
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | X_refsource_confirm |
|
http://www.securityfocus.com/bid/63174 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/88133 | Vdb Entry | |
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01 | X_refsource_confirm | |
https://www.tenable.com/security/research/tra-2016-23 | X_refsource_misc |
URL | Date | SRC |
---|---|---|
https://github.com/GrrrDog/ACEDcup | 2022-09-06 | |
https://github.com/sa1g0n1337/Payload_CVE_2013_2186 | 2019-04-25 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html | 2018-01-09 | |
http://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html | 2018-01-09 | |
http://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html | 2018-01-09 | |
http://rhn.redhat.com/errata/RHSA-2013-1428.html | 2018-01-09 | |
http://rhn.redhat.com/errata/RHSA-2013-1429.html | 2018-01-09 | |
http://rhn.redhat.com/errata/RHSA-2013-1430.html | 2018-01-09 | |
http://rhn.redhat.com/errata/RHSA-2013-1442.html | 2018-01-09 | |
http://rhn.redhat.com/errata/RHSA-2013-1448.html | 2018-01-09 | |
http://ubuntu.com/usn/usn-2029-1 | 2018-01-09 | |
http://www.debian.org/security/2013/dsa-2827 | 2018-01-09 | |
https://access.redhat.com/errata/RHSA-2016:0070 | 2018-01-09 | |
https://access.redhat.com/security/cve/CVE-2013-2186 | 2016-01-26 | |
https://bugzilla.redhat.com/show_bug.cgi?id=974814 | 2016-01-26 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Jboss Enterprise Brms Platform Search vendor "Redhat" for product "Jboss Enterprise Brms Platform" | 5.3.1 Search vendor "Redhat" for product "Jboss Enterprise Brms Platform" and version "5.3.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Portal Platform Search vendor "Redhat" for product "Jboss Enterprise Portal Platform" | 4.3.0 Search vendor "Redhat" for product "Jboss Enterprise Portal Platform" and version "4.3.0" | cp07 |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Portal Platform Search vendor "Redhat" for product "Jboss Enterprise Portal Platform" | 5.2.2 Search vendor "Redhat" for product "Jboss Enterprise Portal Platform" and version "5.2.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Portal Platform Search vendor "Redhat" for product "Jboss Enterprise Portal Platform" | 6.0.0 Search vendor "Redhat" for product "Jboss Enterprise Portal Platform" and version "6.0.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Web Server Search vendor "Redhat" for product "Jboss Enterprise Web Server" | 1.0.2 Search vendor "Redhat" for product "Jboss Enterprise Web Server" and version "1.0.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openshift Search vendor "Redhat" for product "Openshift" | <= 3.1 Search vendor "Redhat" for product "Openshift" and version " <= 3.1" | enterprise |
Affected
| ||||||
Ubuntu Search vendor "Ubuntu" | Ubuntu Search vendor "Ubuntu" for product "Ubuntu" | 10.04 Search vendor "Ubuntu" for product "Ubuntu" and version "10.04" | lts |
Affected
|