All vulnerability reports

Apache Commons FileUpload - DoS with excessive parts

Severity:
High (Base score 7.5) CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Overview

Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.

See CWE-770: Allocation of Resources Without Limits or Throttling

Affected products and mitigation

Users of affected versions should apply the following mitigation or upgrade. Releases that have fixed this issue include:

Product version Mitigation
Vaadin 10.0.0 - 10.0.21 Upgrade to 10.0.22 (Vaadin extended maintenance starting from June 2023)
Vaadin 11.0.0 - 14.9.6 Upgrade to 14.9.7 or newer
Vaadin 15.0.0 - 22.0.28  Upgrade to 22.1.0  (Vaadin extended maintenance starting from March 2023)
Vaadin 23.0.0 - 23.3.7 Upgrade to 23.3.8 or newer

Please note that Vaadin versions 11-13 and 15-22.0 are no longer supported and you should update either to the latest 14, 22.1, 23, 24 version.

Artifacts

Maven coordinates Vulnerable version Fixed version
com.vaadin:flow-server   1.0.0 - 1.0.17  ≥1.0.18
com.vaadin:flow-server   1.1.0 - 2.8.5 ≥2.8.6
com.vaadin:flow-server  3.0.0 - 9.0.26  ≥9.1.0
com.vaadin:flow-server  23.0.0 - 23.3.4 ≥23.3.5
com.vaadin:flow-server   24.0.0.alpha1 - 24.0.rc3 ≥24.0.0

References

Original CVE: nvd.nist.gov/vuln/detail/CVE-2023-24998

Vendor advisory: lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy

History

  • 2023-06-22: Initial vulnerability report published