First published: Sun Jun 16 2013(Updated: )
The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/commons-fileupload:commons-fileupload | <1.3.1 | 1.3.1 |
Red Hat JBoss Enterprise BRMS Platform | =5.3.1 | |
Red Hat JBoss Portal | =4.3.0-cp07 | |
Red Hat JBoss Portal | =5.2.2 | |
Red Hat JBoss Portal | =6.0.0 | |
Red Hat JBoss Enterprise Web Server | =1.0.2 | |
Red Hat OpenShift | <=3.1 | |
Ubuntu | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2186 has been classified as a high severity vulnerability due to the potential for remote file writing by attackers.
To fix CVE-2013-2186, upgrade to commons-fileupload version 1.3.1 or later.
CVE-2013-2186 affects various versions of Apache Commons FileUpload used in Red Hat JBoss BRMS, JBoss Portal, and Red Hat JBoss Web Server.
CVE-2013-2186 is classified as a poison null byte flaw that allows remote attackers to exploit file upload functionality.
Yes, if you are running affected versions of Red Hat JBoss Web Server, you are at risk of the vulnerabilities described in CVE-2013-2186.