Bug 838671 (CVE-2013-2185) - VUL-0: CVE-2013-2185: tomcat: Arbitrary file upload via deserialization
Summary: VUL-0: CVE-2013-2185: tomcat: Arbitrary file upload via deserialization
Status: RESOLVED FIXED
Alias: CVE-2013-2185
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Michal Vyskocil
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/92098/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-09-05 13:19 UTC by Alexander Bergmann
Modified: 2019-05-31 06:42 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2013-09-05 13:19:40 UTC
CVE-2013-2185 was assigned for this issue.

https://bugzilla.redhat.com/show_bug.cgi?id=974813

Description Arun Babu Neelicattu 2013-06-16 01:25:42 EDT

A poison null byte flaw was found in the implementation of the DiskFileItem class. A remote attacker able to supply a serialized instance of the DiskFileItem class, which will be deserialized on a server, could use this flaw to write arbitrary content to any location on the server that is permitted by the user running the application server process.

-----------------------
Comment via oss-security:

From: David Jorm
Date: Thu, 05 Sep 2013 13:35:23 +1000

This flaw was reported to the tomcat security team, but they were of the
opinion that it did not constitute a security flaw in tomcat. The Red
Hat security team decided that we did consider it a security flaw in
tomcat, and handled it accordingly. I think whether or not this category
of issue is considered a security flaw is an unresolved debate - having
some consensus either way would be helpful in my opinion.

The DiskFileItem class's readObject method contained a poison null byte
flaw. A remote attacker able to supply a serialized instance of the
DiskFileItem class, which will be deserialized on a server, could use
this flaw to write arbitrary content to any location on the server that
is permitted by the user running the application server process. The key
point here is that an application is only vulnerable if it deserializes
arbitrary user-supplied data, and it has DiskFileItem on the classpath.
One argument is that since exploitation relies on an application
allowing deserialization of user-supplied data, the real flaw lies in
that application, so this is not actually a security flaw in
DiskFileItem. The opposing argument is that an application allowing
deserialization of user-supplied data would not necessarily expose any
kind of security flaw, but if a vulnerable class (e.g. DiskFileItem)
existed on the server's classpath, then it would, therefore this is a
security flaw in DiskFileItem.
Comment 1 Swamp Workflow Management 2013-09-05 22:00:24 UTC
bugbot adjusting priority
Comment 6 Marcus Meissner 2013-10-30 15:43:45 UTC
Michal evaluated:

SLE11: The DiscFileItem class is not in the sourcecode, so it is not affected.

12.1, 12.2: affected

As of r1470437, the readObject was
removed, so more recent tomcat (12.3/13.1/Factory) is not vulnerable.

http://svn.apache.org/viewvc?view=revision&revision=1470437



Given that 12.2 is phasing out in 2.5 months and this is not a severe issue, I would close this now.