Lucene search

K
jvnJapan Vulnerability NotesJVN:14876762
HistoryFeb 10, 2014 - 12:00 a.m.

JVN#14876762: Apache Commons FileUpload vulnerable to denial-of-service (DoS)

2014-02-1000:00:00
Japan Vulnerability Notes
jvn.jp
27

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.166 Low

EPSS

Percentile

95.9%

Apache Commons FileUpload provided by Apache Software Foundation contains an issue in processing a multi-part request, which may cause the process to be in an infinite loop.

As of 2014 February 12, an exploit tool to attack against this vulnerability has been confirmed.

Impact

Processing a malformed request may cause the condition that the target system does not respond.

Solution

Update the Software
Update to the latest version that contains a fix fot this vulnerability:

Products Affected

  • Commons FileUpload 1.0 to 1.3
  • Apache Tomcat 8.0.0-RC1 to 8.0.1
  • Apache Tomcat 7.0.0 to 7.0.50
  • Products that use Apache Commons FileUpload
    According to the developer, Apache Tomcat 6 and earlier are not affected.

The developer also states that Apache Commons FileUpload is widely used for multiple Apache products, therefore, multiple Apache products other than Apache Tomcat may be affected by this vulnerability.
According to the developer, the following products may be affected.

  • Jenkins
  • JSPWiki
  • JXP
  • Lucene-Solr
  • onemind-commons
  • Spring
  • Stapler
  • Struts 1, 2
  • WSDL2c

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.166 Low

EPSS

Percentile

95.9%