Vulnerability Details : CVE-2014-0050
Public exploit exists!
MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.
Vulnerability category: Denial of service
Threat overview for CVE-2014-0050
Top countries where our scanners detected CVE-2014-0050
Top open port discovered on systems with this issue
80
IPs affected by CVE-2014-0050 16,743
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2014-0050!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2014-0050
Probability of exploitation activity in the next 30 days: 16.60%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2014-0050
-
Apache Commons FileUpload and Apache Tomcat DoS
Disclosure Date: 2014-02-06First seen: 2020-04-26auxiliary/dos/http/apache_commons_fileupload_dosThis module triggers an infinite loop in Apache Commons FileUpload 1.0 through 1.3 via a specially crafted Content-Type header. Apache Tomcat 7 and Apache Tomcat 8 use a copy of FileUpload to handle mime-multipart requests, therefore, Apache Tomcat 7.0.0 through 7.0.
CVSS scores for CVE-2014-0050
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-0050
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0050
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
HPSBMU03691 rev.1 - HPE Insight Control, Multiple Remote Vulnerabilities
-
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
Oracle Critical Patch Update - January 2016
-
http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907@apache.org%3E
[SECURITY] CVE-2014-0050 Apache Commons FileUpload and Apache Tomcat DoS
-
http://www-01.ibm.com/support/docview.wss?uid=swg21669554
IBM Security Bulletin: Potential Security Vulnerabilities fixed in IBM WebSphere Application Server 8.5.5.2
-
http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html
VMware Security Advisory 2014-0007 ≈ Packet Storm
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
HPSBGN03669 rev.2 - HPE SiteScope, Local Elevation of Privilege, Remote Denial of Service, Arbitrary Code Execution and Cross-Site Request Forgery
-
http://tomcat.apache.org/security-8.html
Apache Tomcat® - Apache Tomcat 8 vulnerabilitiesPatch;Vendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-0400.html
RHSA-2014:0400 - Security Advisory - Red Hat Customer Portal
-
http://www-01.ibm.com/support/docview.wss?uid=swg21676410
IBM Security Bulletin: DataQuant for WebSphere is affected by a vulnerability in Apache Commons FileUpload (CVE-2014-0050)
-
http://svn.apache.org/r1565143
[Apache-SVN] Revision 1565143Patch
-
http://www-01.ibm.com/support/docview.wss?uid=swg21676092
IBM Security Bulletin: Potential Security Vulnerabilities fixed in IBM WebSphere Application Server 8.0.0.9
-
http://www.securityfocus.com/bid/65400
Apache Commons FileUpload CVE-2014-0050 Denial Of Service Vulnerability
-
http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html
404 Not Found | TrustwaveExploit
-
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
VMSA-2014-0012.1
-
http://www-01.ibm.com/support/docview.wss?uid=swg21676401
IBM Security Bulletin: QMF for WebSphere is affected by a vulnerability in Apache Commons FileUpload (CVE-2014-0050)
-
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
Oracle Critical Patch Update - July 2014
-
http://www-01.ibm.com/support/docview.wss?uid=swg21677724
IBM Security Bulletin: Apache Commons FileUpload is vulnerable to a denial of service (CVEID: CVE-2014-0050) in IBM Content Manager Services for Lotus Quickr
-
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html
DoS Vulnerability in JP1/IT Desktop Management - Manager and Job Management Partner 1/IT Desktop Management - Manager: Software Vulnerability Information: Software: Hitachi
-
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
VMSA-2014-0008.2
-
http://marc.info/?l=bugtraq&m=143136844732487&w=2
'[security bulletin] HPSBGN03329 rev.1 - HP SDN VAN Controller, Remote Denial of Service (DoS), Distr' - MARC
-
http://tomcat.apache.org/security-7.html
Apache Tomcat® - Apache Tomcat 7 vulnerabilitiesPatch;Vendor Advisory
-
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
Oracle Critical Patch Update - April 2015
-
http://www.ubuntu.com/usn/USN-2130-1
USN-2130-1: Tomcat vulnerabilities | Ubuntu security notices
-
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017
JVNDB-2014-000017 - JVN iPedia - 脆弱性対策情報データベース
-
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
Oracle Critical Patch Update - October 2014
-
http://www.debian.org/security/2014/dsa-2856
Debian -- Security Information -- DSA-2856-1 libcommons-fileupload-java
-
http://www-01.ibm.com/support/docview.wss?uid=swg21676853
IBM Security Bulletin: A security vulnerability has been identified in Business Space shipped with IBM Business Monitor and WebSphere Business Monitor (CVE-2014-0050)
-
http://www-01.ibm.com/support/docview.wss?uid=swg21676405
IBM notice: The page you requested cannot be displayed
-
https://bugzilla.redhat.com/show_bug.cgi?id=1062337
1062337 – (CVE-2014-0050) CVE-2014-0050 apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream
-
http://www-01.ibm.com/support/docview.wss?uid=swg21675432
IBM notice: The page you requested cannot be displayed
-
http://www-01.ibm.com/support/docview.wss?uid=swg21676656
IBM Security Bulletin: IBM Domino and IBM XWork Server Vulnerable to Apache Commons FileUpload Denial of Service (CVE-2014-0050)
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
HPSBMU03685 rev.1 - HPE Insight Control server provisioning (ICsp), Multiple Remote Vulnerabilities
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Oracle Critical Patch Update - October 2017
-
http://seclists.org/fulldisclosure/2014/Dec/23
Full Disclosure: NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
-
http://www-01.ibm.com/support/docview.wss?uid=swg21676091
IBM Security Bulletin: Potential Security Vulnerabilities fixed in IBM WebSphere Application Server 7.0.0.33
-
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Oracle Critical Patch Update - January 2015
-
http://www.securityfocus.com/archive/1/532549/100/0/threaded
SecurityFocus
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
Oracle Critical Patch Update - October 2016
-
http://jvn.jp/en/jp/JVN14876762/index.html
JVN#14876762: Apache Commons FileUpload vulnerable to denial-of-service (DoS)
-
http://www.vmware.com/security/advisories/VMSA-2014-0007.html
VMSA-2014-0007.2
-
http://www-01.ibm.com/support/docview.wss?uid=swg21681214
IBM notice: The page you requested cannot be displayed
-
http://www.securityfocus.com/archive/1/534161/100/0/threaded
SecurityFocus
-
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html
DoS Vulnerability in Hitachi IT Operations Analyzer: Software Vulnerability Information: Software: Hitachi
-
http://rhn.redhat.com/errata/RHSA-2014-0252.html
RHSA-2014:0252 - Security Advisory - Red Hat Customer Portal
-
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html
DoS Vulnerability in Hitachi IT Operations Director: Software Vulnerability Information: Software: Hitachi
-
http://www-01.ibm.com/support/docview.wss?uid=swg21677691
IBM Security Bulletin: IBM Enterprise Records (CVE-2014-0050)
-
http://rhn.redhat.com/errata/RHSA-2014-0253.html
RHSA-2014:0253 - Security Advisory - Red Hat Customer Portal
-
http://www-01.ibm.com/support/docview.wss?uid=swg21676403
IBM notice: The page you requested cannot be displayed
-
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm
Security Advisory-Apache Struts2 vulnerability on Huawei multiple products
-
https://security.gentoo.org/glsa/202107-39
Apache Commons FileUpload: Multiple vulnerabilities (GLSA 202107-39) — Gentoo security
-
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
Oracle Critical Patch Update - October 2015
-
http://advisories.mageia.org/MGASA-2014-0110.html
Mageia Advisory: MGASA-2014-0110 - Updated tomcat packages fix CVE-2014-0050
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
mandriva.com
Products affected by CVE-2014-0050
- cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.48:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.49:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*
- cpe:2.3:a:apache:commons_fileupload:*:*:*:*:*:*:*:*
- cpe:2.3:a:apache:commons_fileupload:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:commons_fileupload:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:commons_fileupload:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:commons_fileupload:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:commons_fileupload:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:commons_fileupload:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:12.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:12.0in:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:13.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:13.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:13.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:14.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:13.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:13.1:*:*:*:*:*:*:*