// For flags

CVE-2013-2186

commons-fileupload: Arbitrary file upload via deserialization

Severity Score

7.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.

La clase DiskFileItem en Apache Commons FileUpload, tal como se utiliza en Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2 y 6.0.0; y Red Hat JBoss Web Server 1.0.2 permite a atacantes remotos escribir en archivos arbitrarios a través de un byte NULL en un nombre de archivo en una instancia serializada.

The Apache Commons FileUpload component can be used to add a file upload capability to your applications. A flaw was found in the way the DiskFileItem class handled NULL characters in file names. A remote attacker able to supply a serialized instance of the DiskFileItem class, which will be deserialized on a server, could use this flaw to write arbitrary content to any location on the server that is accessible to the user running the application server process. All users of Red Hat JBoss Web Server 1.0.2 as provided from the Red Hat Customer Portal are advised to apply this update.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-02-19 CVE Reserved
  • 2013-10-16 CVE Published
  • 2019-04-25 First Exploit
  • 2024-08-06 CVE Updated
  • 2025-03-18 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
  • CWE-626: Null Byte Interaction Error (Poison Null Byte)
CAPEC
References (23)
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Jboss Enterprise Brms Platform
Search vendor "Redhat" for product "Jboss Enterprise Brms Platform"
5.3.1
Search vendor "Redhat" for product "Jboss Enterprise Brms Platform" and version "5.3.1"
-
Affected
Redhat
Search vendor "Redhat"
Jboss Enterprise Portal Platform
Search vendor "Redhat" for product "Jboss Enterprise Portal Platform"
4.3.0
Search vendor "Redhat" for product "Jboss Enterprise Portal Platform" and version "4.3.0"
cp07
Affected
Redhat
Search vendor "Redhat"
Jboss Enterprise Portal Platform
Search vendor "Redhat" for product "Jboss Enterprise Portal Platform"
5.2.2
Search vendor "Redhat" for product "Jboss Enterprise Portal Platform" and version "5.2.2"
-
Affected
Redhat
Search vendor "Redhat"
Jboss Enterprise Portal Platform
Search vendor "Redhat" for product "Jboss Enterprise Portal Platform"
6.0.0
Search vendor "Redhat" for product "Jboss Enterprise Portal Platform" and version "6.0.0"
-
Affected
Redhat
Search vendor "Redhat"
Jboss Enterprise Web Server
Search vendor "Redhat" for product "Jboss Enterprise Web Server"
1.0.2
Search vendor "Redhat" for product "Jboss Enterprise Web Server" and version "1.0.2"
-
Affected
Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
<= 3.1
Search vendor "Redhat" for product "Openshift" and version " <= 3.1"
enterprise
Affected
Ubuntu
Search vendor "Ubuntu"
Ubuntu
Search vendor "Ubuntu" for product "Ubuntu"
10.04
Search vendor "Ubuntu" for product "Ubuntu" and version "10.04"
lts
Affected