GHSA-v6c7-8qx5-8gmp

Suggest an improvement
Source
https://github.com/advisories/GHSA-v6c7-8qx5-8gmp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-v6c7-8qx5-8gmp/GHSA-v6c7-8qx5-8gmp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-v6c7-8qx5-8gmp
Aliases
  • CVE-2013-2185
Published
2022-05-17T03:47:51Z
Modified
2024-12-04T05:36:58.235916Z
Summary
Deserialization of Untrusted Data in Apache Tomcat
Details

The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186.

NOTE: this issue is reportedly disputed by the Apache Tomcat team, although Red Hat considers it a vulnerability. The dispute appears to regard whether it is the responsibility of applications to avoid providing untrusted data to be deserialized, or whether this class should inherently protect against this issue. Regardless the tomcat maintainers have altered the behavior of this method in version 7.0.39.

Database specific
{
    "nvd_published_at": "2014-01-19T18:02:00Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-11-03T21:09:17Z"
}
References

Affected packages

Maven / org.apache.tomcat:tomcat

Package

Name
org.apache.tomcat:tomcat
View open source insights on deps.dev
Purl
pkg:maven/org.apache.tomcat/tomcat

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.0.39

Affected versions

7.*

7.0.35
7.0.37