CVE-2014-0050

Public Exploit

Description

MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.

Category

7.5
CVSS
Severity: High
CVSS 2.0 •
EPSS 92.59% Top 5%
Vendor Advisory marc.info Vendor Advisory debian.org Vendor Advisory mandriva.com Vendor Advisory redhat.com Vendor Advisory ubuntu.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory gentoo.org Vendor Advisory apache.org Vendor Advisory apache.org
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
http://www-01.ibm.com/support/docview.wss?uid=swg21676656
http://jvn.jp/en/jp/JVN14876762/index.html third party advisory
http://marc.info/?l=bugtraq&m=143136844732487&w=2 vendor advisory
http://secunia.com/advisories/60753 third party advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1062337
http://secunia.com/advisories/59184 third party advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677691
http://www.debian.org/security/2014/dsa-2856 vendor advisory
http://secunia.com/advisories/59039 third party advisory
http://secunia.com/advisories/59185 third party advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676401
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
http://secunia.com/advisories/58075 third party advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676853
http://secunia.com/advisories/59187 third party advisory
http://secunia.com/advisories/59041 third party advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676092
http://www-01.ibm.com/support/docview.wss?uid=swg21681214
http://www.vmware.com/security/advisories/VMSA-2014-0007.html
http://secunia.com/advisories/60475 third party advisory
http://svn.apache.org/r1565143 patch
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
http://advisories.mageia.org/MGASA-2014-0110.html
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html exploit
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084 vendor advisory
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www-01.ibm.com/support/docview.wss?uid=swg21676410
http://www-01.ibm.com/support/docview.wss?uid=swg21676405
http://tomcat.apache.org/security-7.html patch vendor advisory
http://secunia.com/advisories/59492 third party advisory
http://www.securityfocus.com/archive/1/534161/100/0/threaded mailing list
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://secunia.com/advisories/59500 third party advisory
http://secunia.com/advisories/59183 third party advisory
http://tomcat.apache.org/security-8.html patch vendor advisory
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www-01.ibm.com/support/docview.wss?uid=swg21676403
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://rhn.redhat.com/errata/RHSA-2014-0252.html vendor advisory
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017 third party advisory
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
http://www.ubuntu.com/usn/USN-2130-1 vendor advisory
http://www.securityfocus.com/bid/65400 vdb entry
http://rhn.redhat.com/errata/RHSA-2014-0400.html vendor advisory
http://secunia.com/advisories/59725 third party advisory
http://seclists.org/fulldisclosure/2014/Dec/23 mailing list
http://www-01.ibm.com/support/docview.wss?uid=swg21675432
http://secunia.com/advisories/57915 third party advisory
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://secunia.com/advisories/59399 third party advisory
http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907%40apache.org%3E mailing list
http://www-01.ibm.com/support/docview.wss?uid=swg21676091
http://secunia.com/advisories/58976 third party advisory
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html
http://rhn.redhat.com/errata/RHSA-2014-0253.html vendor advisory
http://secunia.com/advisories/59232 third party advisory
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html
http://www-01.ibm.com/support/docview.wss?uid=swg21677724
http://www.securityfocus.com/archive/1/532549/100/0/threaded mailing list
http://www-01.ibm.com/support/docview.wss?uid=swg21669554
https://security.gentoo.org/glsa/202107-39 vendor advisory

Frequently Asked Questions

What is the severity of CVE-2014-0050?
CVE-2014-0050 has been scored as a high severity vulnerability.
How to fix CVE-2014-0050?
To fix CVE-2014-0050, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2014-0050 being actively exploited in the wild?
It is possible that CVE-2014-0050 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~93% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.