Bug 922146 (CVE-2013-0248)

Summary: CVE-2013-0248 jakarta-commons-fileupload, apache-commons-fileupload: /tmp directory used by default for uploaded files (possibility to overwrite arbitrary files)
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: acathrow, aileenc, alazarot, alonbl, aneelica, asantos, bazulay, bdawidow, bmcclain, brms-jira, chazlett, dblechte, dknox, ecohen, epp-bugs, etirelli, gklein, gvarsami, hfnukal, idith, iheim, jbpapp-maint, jclere, jcoleman, jerboaa, jpallich, kconner, ldimaggi, lgao, lpetrovi, lsurette, mbaluch, michal.skrivanek, mizdebsk, msimacek, msrb, mweiler, mwinkler, myarboro, nwallace, pavelp, pcheung, rbalakri, Rhev-m-bugs, rhq-maint, rrajasek, rwagner, rzhang, soa-p-jira, sochotni, SpikeFedora, spinder, tcunning, theute, tkirby, tradej, weli, yeylon, ylavi
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: commons-fileupload 1.3 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-02-10 10:12:01 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 922147    
Bug Blocks: 922151    

Description Jan Lieskovsky 2013-03-15 15:08:45 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-0248 to the following vulnerability:

The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack.

References:
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0248
[2] http://archives.neohapsis.com/archives/bugtraq/2013-03/0035.html
[3] http://www.osvdb.org/90906

Comment 1 Jan Lieskovsky 2013-03-15 15:09:42 UTC
Created apache-commons-fileupload tracking bugs for this issue

Affects: fedora-all [bug 922147]

Comment 2 Arun Babu Neelicattu 2015-02-10 08:49:14 UTC
Mitigation:

By default, the system wide temporary directory is configured as the repository to use when uploading files. Setting the repository to another location will mitigate this vulnerability.

Comment 3 Arun Babu Neelicattu 2015-02-10 09:37:50 UTC
Statement:

Red Hat Enterprise Linux 5 and Red Hat Satellite Server 5 are now in Production 3 and Production 2 Phases of the support and maintenance life cycle respectively. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/ and the Red Hat Satellite and Proxy Server Life Cycle: https://access.redhat.com/support/policy/updates/satellite.

Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 4 and 5; Red Hat JBoss Enterprise Portal Platform 5; Red Hat JBoss Enterprise SOA Platform 4 and 5; and Red Hat JBoss Enterprise Web Server 1 are now in Phase 3, Extended Life Support, of their respective life cycles. This issue has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/.

This issue affects the versions of commons-fileupload as shipped with Red Hat Enterprise Virtualization Manager 3 and Red Hat JBoss Fuse Service Works 6. Red Hat Product Security has rated this issue as having Low security impact. A future update to these products may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Comment 4 Arun Babu Neelicattu 2015-02-10 10:12:01 UTC
Victims Record:

https://github.com/victims/victims-cve-db/blob/master/database/java/2013/0248.yaml