Bug 922146 (CVE-2013-0248) - CVE-2013-0248 jakarta-commons-fileupload, apache-commons-fileupload: /tmp directory used by default for uploaded files (possibility to overwrite arbitrary files)
Summary: CVE-2013-0248 jakarta-commons-fileupload, apache-commons-fileupload: /tmp dir...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2013-0248
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 922147
Blocks: 922151
TreeView+ depends on / blocked
 
Reported: 2013-03-15 15:08 UTC by Jan Lieskovsky
Modified: 2021-02-17 07:55 UTC (History)
59 users (show)

Fixed In Version: commons-fileupload 1.3
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-02-10 10:12:01 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2013-03-15 15:08:45 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-0248 to the following vulnerability:

The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack.

References:
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0248
[2] http://archives.neohapsis.com/archives/bugtraq/2013-03/0035.html
[3] http://www.osvdb.org/90906

Comment 1 Jan Lieskovsky 2013-03-15 15:09:42 UTC
Created apache-commons-fileupload tracking bugs for this issue

Affects: fedora-all [bug 922147]

Comment 2 Arun Babu Neelicattu 2015-02-10 08:49:14 UTC
Mitigation:

By default, the system wide temporary directory is configured as the repository to use when uploading files. Setting the repository to another location will mitigate this vulnerability.

Comment 3 Arun Babu Neelicattu 2015-02-10 09:37:50 UTC
Statement:

Red Hat Enterprise Linux 5 and Red Hat Satellite Server 5 are now in Production 3 and Production 2 Phases of the support and maintenance life cycle respectively. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/ and the Red Hat Satellite and Proxy Server Life Cycle: https://access.redhat.com/support/policy/updates/satellite.

Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 4 and 5; Red Hat JBoss Enterprise Portal Platform 5; Red Hat JBoss Enterprise SOA Platform 4 and 5; and Red Hat JBoss Enterprise Web Server 1 are now in Phase 3, Extended Life Support, of their respective life cycles. This issue has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/.

This issue affects the versions of commons-fileupload as shipped with Red Hat Enterprise Virtualization Manager 3 and Red Hat JBoss Fuse Service Works 6. Red Hat Product Security has rated this issue as having Low security impact. A future update to these products may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Comment 4 Arun Babu Neelicattu 2015-02-10 10:12:01 UTC
Victims Record:

https://github.com/victims/victims-cve-db/blob/master/database/java/2013/0248.yaml


Note You need to log in before you can comment on or make changes to this bug.