High severityNVD Advisory· Published Apr 1, 2014· Updated May 6, 2026
CVE-2014-0050
CVE-2014-0050
Description
MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
commons-fileupload:commons-fileuploadMaven | < 1.3.1 | 1.3.1 |
org.apache.tomcat:tomcatMaven | >= 8.0.0-RC1, < 8.0.3 | 8.0.3 |
org.apache.tomcat:tomcatMaven | >= 7.0.0, < 7.0.52 | 7.0.52 |
Affected products
74cpe:2.3:a:apache:commons_fileupload:*:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:apache:commons_fileupload:*:*:*:*:*:*:*:*range: <=1.3
- cpe:2.3:a:apache:commons_fileupload:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:commons_fileupload:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:commons_fileupload:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:commons_fileupload:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:commons_fileupload:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:commons_fileupload:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*+ 58 more
- cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.48:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.49:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_applications:12.0:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:a:oracle:retail_applications:12.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:12.0in:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:13.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:13.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:13.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:13.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:13.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_applications:14.0:*:*:*:*:*:*:*
Patches
2c61ff05b324129384723d8d9https://github.com/apache/tomcatvia ghsa
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
79- svn.apache.org/r1565143nvdPatchWEB
- tomcat.apache.org/security-7.htmlnvdPatchVendor AdvisoryWEB
- tomcat.apache.org/security-8.htmlnvdPatchVendor AdvisoryWEB
- blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.htmlnvdExploitWEB
- github.com/advisories/GHSA-xx68-jfcg-xmmfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2014-0050ghsaADVISORY
- advisories.mageia.org/MGASA-2014-0110.htmlnvdWEB
- jvn.jp/en/jp/JVN14876762/index.htmlnvdWEB
- jvndb.jvn.jp/jvndb/JVNDB-2014-000017nvdWEB
- mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907@apache.org%3EghsaWEB
- marc.infonvdWEB
- packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.htmlnvdWEB
- rhn.redhat.com/errata/RHSA-2014-0252.htmlnvdWEB
- rhn.redhat.com/errata/RHSA-2014-0253.htmlnvdWEB
- rhn.redhat.com/errata/RHSA-2014-0400.htmlnvdWEB
- seclists.org/fulldisclosure/2014/Dec/23nvdWEB
- secunia.com/advisories/57915nvdWEB
- secunia.com/advisories/58075nvdWEB
- secunia.com/advisories/58976nvdWEB
- secunia.com/advisories/59039nvdWEB
- secunia.com/advisories/59041nvdWEB
- secunia.com/advisories/59183nvdWEB
- secunia.com/advisories/59184nvdWEB
- secunia.com/advisories/59185nvdWEB
- secunia.com/advisories/59187nvdWEB
- secunia.com/advisories/59232nvdWEB
- secunia.com/advisories/59399nvdWEB
- secunia.com/advisories/59492nvdWEB
- secunia.com/advisories/59500nvdWEB
- secunia.com/advisories/59725nvdWEB
- secunia.com/advisories/60475nvdWEB
- secunia.com/advisories/60753nvdWEB
- www-01.ibm.com/support/docview.wssnvdWEB
- www-01.ibm.com/support/docview.wssnvdWEB
- www-01.ibm.com/support/docview.wssnvdWEB
- www-01.ibm.com/support/docview.wssnvdWEB
- www-01.ibm.com/support/docview.wssnvdWEB
- www-01.ibm.com/support/docview.wssnvdWEB
- www-01.ibm.com/support/docview.wssnvdWEB
- www-01.ibm.com/support/docview.wssnvdWEB
- www-01.ibm.com/support/docview.wssnvdWEB
- www-01.ibm.com/support/docview.wssnvdWEB
- www-01.ibm.com/support/docview.wssnvdWEB
- www-01.ibm.com/support/docview.wssnvdWEB
- www-01.ibm.com/support/docview.wssnvdWEB
- www.debian.org/security/2014/dsa-2856nvdWEB
- www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.htmlnvdWEB
- www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.htmlnvdWEB
- www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.htmlnvdWEB
- www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htmnvdWEB
- www.mandriva.com/security/advisoriesnvdWEB
- www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlnvdWEB
- www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlnvdWEB
- www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.htmlnvdWEB
- www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlnvdWEB
- www.oracle.com/technetwork/topics/security/cpujan2016-2367955.htmlnvdWEB
- www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlnvdWEB
- www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlnvdWEB
- www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.htmlnvdWEB
- www.securityfocus.com/archive/1/532549/100/0/threadednvdWEB
- www.securityfocus.com/archive/1/534161/100/0/threadednvdWEB
- www.securityfocus.com/bid/65400nvdWEB
- www.ubuntu.com/usn/USN-2130-1nvdWEB
- www.vmware.com/security/advisories/VMSA-2014-0007.htmlnvdWEB
- www.vmware.com/security/advisories/VMSA-2014-0008.htmlnvdWEB
- www.vmware.com/security/advisories/VMSA-2014-0012.htmlnvdWEB
- bugzilla.redhat.com/show_bug.cginvdWEB
- github.com/apache/commons-fileupload/commit/c61ff05b3241cb14d989b67209e57aa71540417aghsaWEB
- github.com/apache/tomcat/commit/29384723d8d9645b87e05be9fa369a4deeb78b9cghsaWEB
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdWEB
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdWEB
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdWEB
- svn.apache.org/viewvcghsaWEB
- svn.apache.org/viewvcghsaWEB
- svn.apache.org/viewvcghsaWEB
- tomcat.apache.org/security-7.htmlghsaWEB
- tomcat.apache.org/security-8.htmlghsaWEB
- mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907%40apache.org%3Envd
- security.gentoo.org/glsa/202107-39nvd
News mentions
0No linked articles in our index yet.