Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-0248

Опубликовано: 06 мар. 2013
Источник: redhat
CVSS2: 2.1
EPSS Низкий

Описание

The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack.

Отчет

Red Hat Enterprise Linux 5 and Red Hat Satellite Server 5 are now in Production 3 and Production 2 Phases of the support and maintenance life cycle respectively. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/ and the Red Hat Satellite and Proxy Server Life Cycle: https://access.redhat.com/support/policy/updates/satellite. Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 4 and 5; Red Hat JBoss Enterprise Portal Platform 5; Red Hat JBoss Enterprise SOA Platform 4 and 5; and Red Hat JBoss Enterprise Web Server 1 are now in Phase 3, Extended Life Support, of their respective life cycles. This issue has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/. This issue affects the versions of commons-fileupload as shipped with Red Hat Enterprise Virtualization Manager 3 and Red Hat JBoss Fuse Service Works 6. Red Hat Product Security has rated this issue as having Low security impact. A future update to these products may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Меры по смягчению последствий

By default, the system wide temporary directory is configured as the repository to use when uploading files. Setting the repository to another location will mitigate this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5jakarta-commons-fileuploadWill not fix
Red Hat Enterprise Virtualization 3jasperreports-server-proFix deferred
Red Hat JBoss BRMS 5commons-fileuploadWill not fix
Red Hat JBoss BRMS 6commons-fileuploadNot affected
Red Hat JBoss Enterprise Application Platform 4commons-fileuploadWill not fix
Red Hat JBoss Enterprise Application Platform 5commons-fileuploadWill not fix
Red Hat JBoss Enterprise Web Server 1amq-6Not affected
Red Hat JBoss Enterprise Web Server 1commons-fileuploadWill not fix
Red Hat JBoss Enterprise Web Server 1eds-5.2Will not fix
Red Hat JBoss Enterprise Web Server 1eds-5.3Will not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-552
https://bugzilla.redhat.com/show_bug.cgi?id=922146apache-commons-fileupload: /tmp directory used by default for uploaded files (possibility to overwrite arbitrary files)

EPSS

Процентиль: 21%
0.00068
Низкий

2.1 Low

CVSS2

Связанные уязвимости

ubuntu
почти 13 лет назад

The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack.

nvd
почти 13 лет назад

The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack.

debian
почти 13 лет назад

The default configuration of javax.servlet.context.tempdir in Apache C ...

github
почти 4 года назад

Incorrect Default Permissions in Apache Commons FileUpload

EPSS

Процентиль: 21%
0.00068
Низкий

2.1 Low

CVSS2