Description
A security vulnerability in the Apache Commons FileUpload before 1.3.1 allows remote attackers to cause a denial of service by manipulating the request header.
In addition to patching Liferay Portal, you should also check if you are using a vulnerable version of Apache Commons FileUpload in other places. For example:
- Application server/servlet container
- Custom plugins and portlets
- Liferay Faces portlets that utilize the following UI components:
bridge:inputFile
(Liferay Faces Bridge)p:fileUpload
(PrimeFaces)rich:fileUpload
(RichFaces)
If one of the above is using a vulnerable version, you should update to the latest version of Apache Commons FileUpload. Alternatively, you may also update to the forked version of FileUpload that is included with the CST patch
See this thread for potential workarounds/mitigation steps.
For more information: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050
Severity
Severity 2
Fixed Version(s)
Publication date: Mon, 16 Jun 2014 15:18:00 +0000