7.5
CVSSv2

CVE-2016-1000031

Published: 25/10/2016 Updated: 20/10/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Apache Commons FileUpload prior to 1.3.3 DiskFileItem File Manipulation Remote Code Execution

Vulnerability Trend

Vendor Advisories

IBM Campaign, IBM Contact Optimization and IBM Marketing Operations are impacted by an Apache Commons FileUpload vulnerability ...
IBM Sterling Order Management uses Apache Commons FileUpload and is affected by some of the vulnerabilities that exist in Apache Commons FileUpload ...
IBM OpenPages GRC Platform has addressed vulnerability in Apache Commons FileUpload (CVE-2016-1000031) ...
On November 5, 2018, the Apache Struts Team released a security announcement urging an upgrade of the Commons FileUpload library to version 133 on systems using Struts 2336 or earlier releases Systems using earlier versions of this library may be exposed to attacks that could allow execution of arbitrary code or modifications of files on the s ...
Apache Commons FileUpload before 133 DiskFileItem File Manipulation Remote Code Execution ...
Oracle Critical Patch Update Advisory - January 2019 Description A Critical Patch Update is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previou ...
IBM Security Privileged Identity Manager has addressed the following security vulnerabilities ...
Oracle Critical Patch Update Advisory - October 2018 Description A Critical Patch Update is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previou ...
IBM has announced a release for IBM Security Identity Governance and Intelligence (IGI) in response to multiple security vulnerabilities There are multiple vulnerabilities fixes to open source libraries distributed with IGI, other less secure algorithms for crypto, xss attacks and click jacking attacks ...

Github Repositories

Generates Deep Security CSV reports

Setup Instructions Download & install the Deep Security SDK Create Deep Security API keys Set the API key as a DS_KEY environment variable Usage Instructions Help Menu $ python3 reporterpy -h usage: reporterpy [-h] [--report-filename REPORT_FILENAME] [--summary-filename SUMMARY_FILENAME] [--app-names [APP_NAMES [APP_NAMES

The cheat sheet about Java Deserialization vulnerabilities

Java-Deserialization-Cheat-Sheet A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries Please, use #javadeser hash tag for tweets Table of content Java Native Serialization (binary) Overview Main talks & presentations & docs Payload generators Exploits Detect Vulnerable apps (without

Compiled dataset of Java deserialization CVEs

Java-Deserialization-CVEs This is a dataset of CVEs related to Java Deserialization Since existing CVE databases do not allow for granular searches by vulnerability type and language, this list was compiled by manually searching the NIST NVD CVE database with different queries If you notice any discrepancies, contributions are very welcome! CVE ID Year CVSS 3/31 risk CV

Recent Articles

Oracle Squashes 53 Critical Bugs in April Security Update
Threatpost • Lindsey O'Donnell • 17 Apr 2019

Oracle is urging customers to patch critical vulnerabilities in its products as part of its massive April update, which fixes a whopping 297 flaws.
Of those flaws, 53 vulnerabilities in Oracle products had a CVSS score of 9.0 or higher, making them “critical” severity – and in fact, 49 of those critical flaws had a CVSS score of 9.8. Products with the most vulnerabilities as part of this quarterly patch include the Oracle Fusion Middleware, the Oracle E-Business Suite and Oracle MySQ...

Apache Struts Team Urges Users for Library Update to Plug Years-Old Bugs
BleepingComputer • Ionut Ilascu • 06 Nov 2018

In an advisory yesterday, the Apache Software Foundation reiterates its recommendation for users of Struts to make sure their installations run a version of the Commons FileUpload library newer than 1.3.2, lest they expose their projects to possible remote code execution attacks.
Versions of the library prior to 1.3.3 have a deserialization problem with a Java Object, which could be exploited to write or copy files to arbitrary locations on the disk.
According to the original adviso...

The Register

Mega Patch Tuesday Microsoft on Tuesday patched a wormable hole in its Windows Server software that can be exploited remotely to completely commandeer the machine without any authorization. It was one of hundreds of security bugs squashed today by Redmond along with Oracle, Adobe, VMware, SAP and Google.
Microsoft emitted fixes for 123 vulnerabilities in this month's Patch Tuesday batch. Some 18 of those CVE-listed security flaws are considered critical, meaning remote code execution (RCE)...

References

CWE-284http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00036.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlhttp://www.securityfocus.com/bid/93604http://www.zerodayinitiative.com/advisories/ZDI-16-570/https://issues.apache.org/jira/browse/FILEUPLOAD-279https://issues.apache.org/jira/browse/WW-4812https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3Ehttps://lists.apache.org/thread.html/d66657323fd25e437face5e84899c8ca404ccd187e81c3f2fa8b6080@%3Cannounce.apache.org%3Ehttps://security.netapp.com/advisory/ntap-20190212-0001/https://www.oracle.com/security-alerts/cpuapr2020.htmlhttps://www.oracle.com/security-alerts/cpujan2020.htmlhttps://www.oracle.com/security-alerts/cpujul2020.htmlhttps://www.oracle.com/security-alerts/cpuoct2020.htmlhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlhttps://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.htmlhttps://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlhttps://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlhttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlhttps://www.tenable.com/security/research/tra-2016-12https://www.tenable.com/security/research/tra-2016-23https://www.tenable.com/security/research/tra-2016-30https://www.rapid7.com/db/vulnerabilities/ibm-was-cve-2016-1000031https://tools.cisco.com/security/center/viewAlert.x?alertId=59098https://nvd.nist.govhttps://threatpost.com/oracle-squashes-53-critical-bugs-in-april-security-update/143845/https://www.rapid7.com/db/vulnerabilities/struts-cve-2016-1000031