Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8908

Опубликовано: 08 сент. 2020
Источник: redhat
CVSS3: 3.3
EPSS Низкий

Описание

A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @Deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.

A flaw was found in Guava that creates temporary directories with default permissions similar to /tmp. This issue may allow local users access, possibly permitting information exposure.

Отчет

Red Hat OpenStack Platform's OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Important and Critical flaws.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of QuarkusguavaFix deferred
Red Hat CodeReady Studio 12guavaFix deferred
Red Hat Decision Manager 7guavaNot affected
Red Hat Enterprise Linux 7guavaOut of support scope
Red Hat Enterprise Linux 8javapackages-tools:201801/guava20Fix deferred
Red Hat Enterprise Linux 8maven:3.5/guava20Fix deferred
Red Hat Enterprise Linux 8maven:3.6/guavaFix deferred
Red Hat Fuse 7guavaFix deferred
Red Hat Integration Camel K 1guavaFix deferred
Red Hat Integration Service RegistryguavaFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-276->CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1906919guava: local information disclosure via temporary directory created with unsafe permissions

EPSS

Процентиль: 22%
0.00072
Низкий

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 3.3
ubuntu
около 5 лет назад

A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @Deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.

CVSS3: 3.3
nvd
около 5 лет назад

A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @Deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.

CVSS3: 3.3
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 3.3
debian
около 5 лет назад

A temp directory creation vulnerability exists in all versions of Guav ...

CVSS3: 3.3
github
почти 5 лет назад

Information Disclosure in Guava

EPSS

Процентиль: 22%
0.00072
Низкий

3.3 Low

CVSS3