Re: apache-commons-fileupload symlink vulnerability CVE-2013-0248

2015-08-01 Thread Andreas Veithen
For this vulnerability to be exploitable, the following conditions must be met: 1) The attacker must have shell access to the machine on which Axis2 runs with any account. Obviously the vulnerability is interesting only if that account is unprivileged and different from the account Axis2 runs as.

RE: apache-commons-fileupload symlink vulnerability CVE-2013-0248

2015-07-23 Thread Martin Gainty
@axis.apache.org Subject: apache-commons-fileupload symlink vulnerability CVE-2013-0248 From: charlie.mar...@uk.ibm.com Date: Thu, 23 Jul 2015 11:41:06 +0100 Hi, The current (v1.6.3) and previous releases of Axis2 contain the apache commons

apache-commons-fileupload symlink vulnerability CVE-2013-0248

2015-07-23 Thread Charlie Martin
Hi, The current (v1.6.3) and previous releases of Axis2 contain the apache commons-fileupload-1.2.jar. This jar is flagged as being vulnerable to CVE-2013-0248 Could anyone confirm if either: This vulnerability is not applicable to the use of the jar in Axis2 If an update is planned Details