Bug 2172298 (CVE-2023-24998)

Summary: CVE-2023-24998 Apache Commons FileUpload: FileUpload DoS with excessive parts
Product: [Other] Security Response Reporter: Chess Hazlett <chazlett>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abenaiss, aileenc, alampare, alazarot, anstephe, asoldano, ataylor, avibelli, bbaranow, bbuckingham, bcourt, bgeorges, bmaxwell, brian.stansberry, btotty, cdewolf, chazlett, clement.escoffier, cmoulliard, csutherl, dandread, darran.lofthouse, dfreiber, dhanak, dkreling, dosoudil, eglynn, ehelms, ellin, emingora, fjuma, fmongiar, gjospin, gmalinko, gsmet, hamadhan, hbraun, huwang, ibek, ikanello, ivassile, iweiss, janstey, jburrell, jclere, jjoyce, jmartisk, jnethert, jolee, jpavlik, jpechane, jpoth, jrokos, jross, jschatte, jsherril, jstastny, kverlaen, kyoshida, lbacciot, lgao, lhh, lthon, lzap, max.andersen, mburns, mgarciac, mhulan, mmadzin, mnovotny, mokumar, mosmerov, msochure, msvehla, nmoumoul, nwallace, orabin, pcreech, pdelbell, peholase, pgallagh, pjindal, pmackay, probinso, rchan, rguimara, rhcs-maint, rjohnson, rkieley, rogbas, rrajasek, rruss, rstancel, rsvoboda, sbiarozk, scorneli, sdouglas, shbose, smaestri, spower, szappis, tcunning, tom.jenkinson, vkumar, yfang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: commons-fileupload 1.5 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Apache Commons FileUpload, where it does not limit the number of parts being processed in a request. This issue may allow an attacker to use a malicious upload or series of uploads to trigger a denial of service. While Red Hat Satellite relies upon Apache Tomcat, it does not directly ship it. Tomcat is shipped with Red Hat Enterprise Linux and consumed by the Candlepin component of Satellite. Red Hat Satellite users are therefore advised to check the impact state of Red Hat Enterprise Linux, since any necessary fixes will be distributed through the platform.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-03 19:45:43 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2173752, 2173753, 2173782, 2174302, 2174303, 2211069, 2211070, 2174671, 2174672, 2175798, 2211066, 2211067, 2211068    
Bug Blocks: 2171907    

Description Chess Hazlett 2023-02-21 21:40:00 UTC
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads.

Comment 5 Chess Hazlett 2023-02-27 21:09:58 UTC
Created apache-commons-fileupload tracking bugs for this issue:

Affects: epel-7 [bug 2173752]
Affects: fedora-all [bug 2173753]

Comment 6 Chess Hazlett 2023-02-28 00:11:26 UTC
Created tomcat tracking bugs for this issue:

Affects: fedora-all [bug 2173782]

Comment 18 errata-xmlrpc 2023-05-03 14:06:54 UTC
This issue has been addressed in the following products:

  RHINT Camel-Springboot 3.20.1

Via RHSA-2023:2100 https://access.redhat.com/errata/RHSA-2023:2100

Comment 19 Product Security DevOps Team 2023-05-03 19:45:35 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-24998

Comment 20 errata-xmlrpc 2023-05-24 17:11:02 UTC
This issue has been addressed in the following products:

  OpenShift Developer Tools and Services for OCP 4.13

Via RHSA-2023:3299 https://access.redhat.com/errata/RHSA-2023:3299

Comment 21 Sandipan Roy 2023-05-30 12:27:13 UTC
Created tomcat tracking bugs for this issue:

Affects: epel-8 [bug 2211066]