Description
The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186. NOTE: this issue is reportedly disputed by the Apache Tomcat team, although Red Hat considers it a vulnerability. The dispute appears to regard whether it is the responsibility of applications to avoid providing untrusted data to be deserialized, or whether this class should inherently protect against this issue
Published: 2014-01-19
Score: 7.5 High
EPSS: 5.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-v6c7-8qx5-8gmp Deserialization of Untrusted Data in Apache Tomcat
History

No history.

Subscriptions

Apache Tomcat
Redhat Jboss Enterprise Application Platform Jboss Enterprise Portal Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T15:27:41.116Z

Reserved: 2013-02-19T00:00:00.000Z

Link: CVE-2013-2185

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-01-19T18:02:57.037

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-2185

cve-icon Redhat

Severity : Important

Publid Date: 2013-09-03T00:00:00Z

Links: CVE-2013-2185 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses