CVE-2013-2186
Summary
| CVE | CVE-2013-2186 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2013-10-28 21:55:05 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Redhat | Jboss Enterprise Brms Platform | 5.3.1 | All | All | All |
| Application | Redhat | Jboss Enterprise Portal Platform | 4.3.0 | cp07 | All | All |
| Application | Redhat | Jboss Enterprise Portal Platform | 5.2.2 | All | All | All |
| Application | Redhat | Jboss Enterprise Portal Platform | 6.0.0 | All | All | All |
| Application | Redhat | Jboss Enterprise Web Server | 1.0.2 | All | All | All |
| Application | Redhat | Openshift | All | All | All | All |
| Operating System | Ubuntu | Ubuntu | 10.04 | All | lts | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Apache Commons FileUpload 'DiskFileItem' Class Null Byte Arbitrary File Write Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| openSUSE-SU-2013:1571-1: moderate: update for jakarta-commons-fileupload | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| rhn.redhat.com/errata/RHSA-2013-1430.html | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | Vendor Advisory |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| Security Advisory SA55716 - Ubuntu update for libcommons-fileupload-java - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Oracle Critical Patch Update - July 2015 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| rhn.redhat.com/errata/RHSA-2013-1429.html | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | Vendor Advisory |
| [security-announce] SUSE-SU-2013:1660-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Jenkins Security Advisory 2014-10-01 - Security Advisories - Jenkins Wiki | af854a3a-2127-422b-91ae-364da2661108 | wiki.jenkins-ci.org | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | Vendor Advisory |
| openSUSE-SU-2013:1596-1: moderate: update for jakarta-commons-fileupload | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Oracle Critical Patch Update - January 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| USN-2029-1: Apache Commons FileUpload vulnerability | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | ubuntu.com | |
| rhn.redhat.com/errata/RHSA-2013-1448.html | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | Vendor Advisory |
| rhn.redhat.com/errata/RHSA-2013-1442.html | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| Oracle Critical Patch Update - January 2015 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | |
| [R4] Apache Wicket DiskFileItem Java Deserialization Remote File Manipulation - Research Advisory | Tenable® | af854a3a-2127-422b-91ae-364da2661108 | www.tenable.com | |
| Debian -- Security Information -- DSA-2827-1 libcommons-fileupload-java | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.