Vulnerability Name:

CVE-2016-1000031

Assigned:2016-10-17
Published:2016-10-17
Updated:2018-06-27
Summary:Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution
CVSS v3 Severity:9.8 Critical (CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (Temporal CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
9.8 Critical (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (CCN Temporal CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-284
References:Source: BID
Type: VENDOR_ADVISORY
93604

Source: MISC
Type: VENDOR_ADVISORY
http://www.zerodayinitiative.com/advisories/ZDI-16-570/

Source: XF
Type: UNKNOWN
apache-cve20161000031-code-exec(117957)

Source: CONFIRM
Type: VENDOR_ADVISORY
https://issues.apache.org/jira/browse/FILEUPLOAD-279

Source: MISC
Type: VENDOR_ADVISORY
https://www.tenable.com/security/research/tra-2016-12

Source: MISC
Type: VENDOR_ADVISORY
https://www.tenable.com/security/research/tra-2016-23

Source: MISC
Type: VENDOR_ADVISORY
https://www.tenable.com/security/research/tra-2016-30

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:commons_fileupload:1.3.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apache:commons_fileupload:1.3.2:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:websphere_mq:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_portal:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_portal:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:10.1::~~collaborative~~~:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_business_service_manager:6.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:8.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:web_experience_factory:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/impact:6.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_mq:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_mq:7.0.4::file_transfer:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_service_registry_and_repository:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_service_registry_and_repository:8.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_service_registry_and_repository:8.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_portal:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:web_experience_factory:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:11.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:5.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:emptoris_contract_management:9.5.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:11.3::~~collaborative~~~:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:11.4::~~collaborative~~~:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_service_registry_and_repository:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_netcool/impact:6.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:case_manager:5.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:11.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:11.5::~~collaborative~~~:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:5.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:content_navigator:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_portal:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:content_navigator:2.0.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:content_navigator:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:content_navigator:2.0.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:content_navigator:3.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium_big_data_intelligence:3.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.precise:def:20161000031000
    V
    CVE-2016-1000031 on Ubuntu 12.04 LTS (precise) - negligible.
    2016-10-25
    oval:com.ubuntu.trusty:def:20161000031000
    V
    CVE-2016-1000031 on Ubuntu 14.04 LTS (trusty) - negligible.
    2016-10-25
    oval:com.ubuntu.xenial:def:20161000031000
    V
    CVE-2016-1000031 on Ubuntu 16.04 LTS (xenial) - negligible.
    2016-10-25
    BACK
    apache commons fileupload 1.3.2
    apache commons fileupload 1.3.2
    ibm websphere mq 7.0
    ibm websphere portal 7.0
    ibm websphere application server 8.0
    ibm websphere portal 8.0
    ibm websphere application server 8.5
    ibm infosphere master data management 10.1
    ibm infosphere information server 9.1
    ibm tivoli business service manager 6.1.1
    ibm websphere application server 8.5.5
    ibm web experience factory 8.0
    ibm tivoli netcool/impact 6.1.1
    ibm websphere mq 7.0.1
    ibm websphere mq 7.0.4
    ibm websphere service registry and repository 8.0
    ibm websphere service registry and repository 8.0.0.1
    ibm websphere service registry and repository 8.0.0.2
    ibm websphere portal 8.5
    ibm web experience factory 8.5
    ibm infosphere information server 11.3
    ibm algo one 5.0.0
    ibm emptoris contract management 9.5.0.3
    ibm infosphere master data management 11.3
    ibm infosphere master data management 11.4
    ibm tivoli application dependency discovery manager 7.2.2
    ibm websphere service registry and repository 8.5
    ibm tivoli netcool/impact 6.1.1
    ibm case manager 5.2.1
    ibm infosphere information server 11.5
    ibm infosphere master data management 11.5
    ibm algo one 5.1.0
    ibm websphere application server 9.0
    ibm content navigator 3.0.0
    ibm websphere portal 9.0
    ibm content navigator 2.0.3.8
    ibm content navigator 3.0.1
    ibm content navigator 2.0.2.8
    ibm content navigator 3.0.2
    ibm security guardium big data intelligence 3.1