跳转到帖子

Red Hat JBossEAP: Files or Directories Accessible to External Parties (CVE-2023-2976)

recommended_posts

发布于
  • Members

Red Hat JBossEAP: Files or Directories Accessible to External Parties (CVE-2023-2976)

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:C/I:N/A:N)
Published
06/14/2023
Created
09/20/2024
Added
09/19/2024
Modified
12/20/2024

Description

Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class. Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.. A flaw was found in Guava. The methodology for temporary directories and files can allow other local users or apps with accordant permissions to access the temp files, possibly leading to information exposure or tampering in the files created in the directory.

Solution(s)

  • red-hat-jboss-eap-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2023-2976
  • CVE - 2023-2976
  • https://access.redhat.com/security/cve/CVE-2023-2976
  • https://bugzilla.redhat.com/show_bug.cgi?id=2215229
  • https://access.redhat.com/errata/RHSA-2023:7637
  • https://access.redhat.com/errata/RHSA-2023:7638
  • https://access.redhat.com/errata/RHSA-2023:7639
  • https://access.redhat.com/errata/RHSA-2023:7641
View more
  • 查看数 702
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…