Vulnerability Name: CVE-2013-4444 (CCN-95876) Assigned: 2013-06-12 Published: 2014-09-10 Updated: 2021-01-07 Summary: Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file. CVSS v3 Severity: 4.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): LowUser Interaction (UI): RequiredScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
6.0 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P )4.4 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-94 Vulnerability Consequences: Gain Access References: Source: BUGTRAQ Type: UNKNOWN20140910 CVE-2013-4444 Remote Code Execution in Apache Tomcat Source: CCN Type: BugTraq Mailing List, Wed Sep 10 2014 - 09:00:24 CDTCVE-2013-4444 Remote Code Execution in Apache Tomcat Source: MITRE Type: CNACVE-2013-4444 Source: HP Type: UNKNOWNHPSBOV03503 Source: MLIST Type: UNKNOWN[oss-security] 20141024 Re: Duplicate Request: CVE-2013-4444 as a duplicate of CVE-2013-2185 Source: FULLDISC Type: UNKNOWN20210106 Re: [SECURITY] CVE-2013-4444 Remote Code Execution in Apache Tomcat Source: CCN Type: Apache Web SiteApache Tomcat Source: CONFIRM Type: Patchhttp://tomcat.apache.org/security-7.html Source: DEBIAN Type: UNKNOWNDSA-3447 Source: CCN Type: IBM Security Bulletin N1020714Vulnerabilities in Tomcat affect Power Hardware Management Console (CVE-2013-4444, CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119, CVE-2014-0227) Source: CCN Type: IBM Security Bulletin 1687262Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerablity (CVE-2013-4444) Source: CCN Type: IBM Security Bulletin 1687761 IBM Algo One is affected by multiple Open Source Tomcat security vulnerabilities (CVE-2013-4444, CVE-2013-4286, CVE-2014-0033, CVE-2013-4322, CVE-2013-4590) Source: CCN Type: IBM Security Bulletin 1689396Security vulnerability about Apache Tomcat JSP file upload in WebSphere Application Server Community Edition 3.0.0.4 Source: CCN Type: IBM Security Bulletin 1693651Vulnerabilities in Sametime Unified Telephony (OpenSSL: CVE-2014-3508 to CVE-2014-3512, CVE-2014-5139. Apache Tomcat: CVE-2014-0099, CVE-2014-0119, CVE-2013-4444) Source: CCN Type: IBM Security Bulletin 1959291Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerability (CVE-2014-0227) Source: CCN Type: IBM Security Bulletin 1959294Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerability (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin 1959298Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server uses an insecure hashing scheme for handling user passwords (CVE-2015-1913) Source: CCN Type: IBM Security Bulletin 1960149Rational Build Forge affected by Apache Tomcat vulnerability (CVE-2014-0227) Source: CCN Type: IBM Security Bulletin 1961729ulnerability in Diffie-Hellman key exchange protocol affects Rational Integration Tester component in Rational Test Workbench, and Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server Source: CCN Type: IBM Security Bulletin 1976103Multiple Security Vulnerabilities in Apache Tomcat affect IBM RLKS Administration and Reporting Tool Source: CCN Type: Oracle CPUOct2016Oracle Critical Patch Update Advisory - October 2016 Source: CONFIRM Type: UNKNOWNhttp://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html Source: BID Type: UNKNOWN69728 Source: CCN Type: BID-69728Apache Tomcat CVE-2013-4444 Arbitrary File Upload Vulnerability Source: SECTRACK Type: UNKNOWN1030834 Source: CCN Type: Red Hat Bugzilla Bug 1140314(CVE-2013-4444) CVE-2013-4444 tomcat: remote code execution via uploaded JSP Source: XF Type: UNKNOWNapache-tomcat-cve20134444-file-upload(95876) Source: CONFIRM Type: UNKNOWNhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013 Source: CCN Type: IBM Security Bulletin 6496741 (Sterling B2B Integrator)Apache Log4j Vulnerabilities Affect IBM Sterling B2B Integrator Source: CCN Type: IBM Security Bulletin 6595755 (Disconnected Log Collector)IBM Disconnected Log Collector is vulnerable to using components with known vulnerabilities Source: CCN Type: IBM Security Bulletin 6858013 (Tivoli Application Dependency Discovery Manager)TADDM affected by multiple vulnerabilities due to Apache Tomcat libraries Source: CCN Type: WhiteSource Vulnerability DatabaseCVE-2013-4444 Vulnerable Configuration: Configuration 1 :cpe:/a:apache:tomcat:7.0.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.33:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.34:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.4:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.23:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.25:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.32:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:*:*:*:*:*:*:*:* (Version <= 7.0.39) OR cpe:/a:apache:tomcat:7.0.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.0:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.21:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.22:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.37:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.38:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.2:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.20:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.35:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.36:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:apache:tomcat:7.0.39:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.26:*:*:*:*:*:*:* AND cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:8.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:8.0.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:8.0.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.3.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.3.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.3.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.3.5:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_application_server:3.0.0.4:-:community:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.2.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.2.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.3.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.7:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.7:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.6.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.6.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.6.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.7.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.6.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.7.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.8:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.9:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.1:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3.0.0:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
apache tomcat 7.0.11
apache tomcat 7.0.12
apache tomcat 7.0.19
apache tomcat 7.0.2
apache tomcat 7.0.26
apache tomcat 7.0.27
apache tomcat 7.0.33
apache tomcat 7.0.34
apache tomcat 7.0.4 beta
apache tomcat 7.0.1
apache tomcat 7.0.10
apache tomcat 7.0.17
apache tomcat 7.0.18
apache tomcat 7.0.23
apache tomcat 7.0.24
apache tomcat 7.0.25
apache tomcat 7.0.31
apache tomcat 7.0.32
apache tomcat *
apache tomcat 7.0.4
apache tomcat 7.0.0
apache tomcat 7.0.0 beta
apache tomcat 7.0.15
apache tomcat 7.0.16
apache tomcat 7.0.21
apache tomcat 7.0.22
apache tomcat 7.0.3
apache tomcat 7.0.30
apache tomcat 7.0.37
apache tomcat 7.0.38
apache tomcat 7.0.13
apache tomcat 7.0.14
apache tomcat 7.0.2 beta
apache tomcat 7.0.20
apache tomcat 7.0.28
apache tomcat 7.0.29
apache tomcat 7.0.35
apache tomcat 7.0.36
apache tomcat 7.0.39
apache tomcat 7.0.26
apache tomcat 7.0.0
ibm rational build forge 8.0
ibm rational build forge 8.0.0.1
ibm rational build forge 8.0.0.2
ibm rational build forge 7.1.3
ibm rational build forge 7.1.3.1
ibm rational build forge 7.1.3.2
ibm rational build forge 7.1.3.3
ibm rational build forge 7.1.3.4
ibm rational build forge 7.1.3.5
ibm websphere application server 3.0.0.4 -
ibm rational license key server 8.1.4
ibm rational license key server 8.1.4.2
ibm rational license key server 8.1.4.3
ibm rational build forge 7.1.2
ibm rational build forge 7.1.2.1
ibm rational build forge 7.1.2.2
ibm rational build forge 7.1.2.3
ibm rational test workbench 8.0
ibm rational test workbench 8.0.0.1
ibm rational test workbench 8.0.0.2
ibm rational test workbench 8.0.0.3
ibm rational test workbench 8.0.1
ibm rational test workbench 8.0.1.1
ibm rational test workbench 8.0.1.2
ibm rational test workbench 8.0.1.3
ibm rational test workbench 8.0.1.4
ibm rational test workbench 8.5
ibm rational test workbench 8.5.0.1
ibm rational test workbench 8.5.0.2
ibm rational build forge 7.1.3.6
ibm rational license key server 8.1.4.4
ibm rational license key server 8.1.4.5
ibm rational license key server 8.1.4.6
ibm rational license key server 8.1.4.7
ibm rational test workbench 8.6
ibm rational test workbench 8.7
ibm rational test workbench 8.0.0.4
ibm rational test workbench 8.0.1.5
ibm rational test workbench 8.5.0.3
ibm rational test workbench 8.5.1
ibm rational test workbench 8.5.1.1
ibm rational test workbench 8.5.1.2
ibm rational test workbench 8.5.1.3
ibm rational test workbench 8.5.1.4
ibm rational test workbench 8.6.0.1
ibm rational test workbench 8.6.0.2
ibm rational test workbench 8.6.0.3
ibm rational test workbench 8.7.0.1
ibm rational test workbench 8.0.0.5
ibm rational test workbench 8.0.1.6
ibm rational test workbench 8.5.0.4
ibm rational test workbench 8.5.1.5
ibm rational test workbench 8.6.0.4
ibm rational test workbench 8.7.0.2
ibm rational license key server 8.1.4.8
ibm rational license key server 8.1.4.9
ibm rational license key server 8.1.4.1
ibm sterling b2b integrator 6.0.0.0
ibm sterling b2b integrator 5.2.0.0
ibm tivoli application dependency discovery manager 7.3.0.0