Описание
The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack.
Отчет
Red Hat Enterprise Linux 5 and Red Hat Satellite Server 5 are now in Production 3 and Production 2 Phases of the support and maintenance life cycle respectively. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/ and the Red Hat Satellite and Proxy Server Life Cycle: https://access.redhat.com/support/policy/updates/satellite. Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 4 and 5; Red Hat JBoss Enterprise Portal Platform 5; Red Hat JBoss Enterprise SOA Platform 4 and 5; and Red Hat JBoss Enterprise Web Server 1 are now in Phase 3, Extended Life Support, of their respective life cycles. This issue has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/. This issue affects the versions of commons-fileupload as shipped with Red Hat Enterprise Virtualization Manager 3 and Red Hat JBoss Fuse Service Works 6. Red Hat Product Security has rated this issue as having Low security impact. A future update to these products may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Меры по смягчению последствий
By default, the system wide temporary directory is configured as the repository to use when uploading files. Setting the repository to another location will mitigate this vulnerability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | jakarta-commons-fileupload | Will not fix | ||
| Red Hat Enterprise Virtualization 3 | jasperreports-server-pro | Fix deferred | ||
| Red Hat JBoss BRMS 5 | commons-fileupload | Will not fix | ||
| Red Hat JBoss BRMS 6 | commons-fileupload | Not affected | ||
| Red Hat JBoss Enterprise Application Platform 4 | commons-fileupload | Will not fix | ||
| Red Hat JBoss Enterprise Application Platform 5 | commons-fileupload | Will not fix | ||
| Red Hat JBoss Enterprise Web Server 1 | amq-6 | Not affected | ||
| Red Hat JBoss Enterprise Web Server 1 | commons-fileupload | Will not fix | ||
| Red Hat JBoss Enterprise Web Server 1 | eds-5.2 | Will not fix | ||
| Red Hat JBoss Enterprise Web Server 1 | eds-5.3 | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
2.1 Low
CVSS2
Связанные уязвимости
The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack.
The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack.
The default configuration of javax.servlet.context.tempdir in Apache C ...
Incorrect Default Permissions in Apache Commons FileUpload
EPSS
2.1 Low
CVSS2