Mon, 16 Jun 2014 15:18:00 +0000
LPS-47093 CVE-2014-0050 DoS using Apache Commons FileUpload
A security vulnerability in the Apache Commons FileUpload before 1.3.1 allows remote attackers to cause a denial of service by manipulating the request header.
In addition to patching Liferay Portal, you should also check if you are using a vulnerable version of Apache Commons FileUpload in other places. For example:
- Application server/servlet container
- Custom plugins and portlets
- Liferay Faces portlets that utilize the following UI components:
bridge:inputFile(Liferay Faces Bridge)
If one of the above is using a vulnerable version, you should update to the latest version of Apache Commons FileUpload. Alternatively, you may also update to the forked version of FileUpload that is included with the CST patch
For more information: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050
See this thread for potential workarounds/mitigation steps.
Issue LinksNote that some or all of these may not yet be accessible. The CST remains committed to full disclosure of all security issues once fully resolved.
See the Community Security Team Process page for details on working with source and binary patches.
Binary Patch Links
Note: The below links point to a download page which contains multiple binary patches with the following naming scheme:
<patch-version>.zip. Be sure to use the latest patch for your Liferay release!
Note: Binary patches only apply to the release with which this issue is associated. Applying a binary patch to any other release will probably result in a broken install!
Source Patch Links
Note that source patches only apply to the release with which this issue is associated. Applying a source patch to any other release will probably result in a broken install! For Github URLs suffixed with
.patch, removing this suffix will yield a graphical view of the patch
This issue was reported to the Apache Software Foundation via JPCERT, and to Liferay via Samuel Kong