Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-45935

Опубликовано: 06 янв. 2023
Источник: redhat
CVSS3: 5.5

Описание

Usage of temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit. Vulnerable components includes the SMTP stack and IMAP APPEND command. This issue affects Apache James server version 3.7.2 and prior versions.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of Apache Camel for Spring Boot 3apache-jamesNot affected
Red Hat build of Apicurio Registry 2apache-jamesNot affected
Red Hat Data Grid 8apache-jamesNot affected
Red Hat Decision Manager 7apache-jamesNot affected
Red Hat Fuse 7apache-jamesNot affected
Red Hat Integration Camel K 1apache-jamesNot affected
Red Hat Integration Camel Quarkus 1apache-jamesNot affected
Red Hat JBoss Data Grid 7apache-jamesNot affected
Red Hat JBoss Data Virtualization 6apache-jamesNot affected
Red Hat JBoss Enterprise Application Platform 6apache-jamesNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=2158908apache-james: Temporary File Information Disclosure

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
nvd
около 3 лет назад

Usage of temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit. Vulnerable components includes the SMTP stack and IMAP APPEND command. This issue affects Apache James server version 3.7.2 and prior versions.

CVSS3: 5.5
github
около 3 лет назад

Apache James server allows an attacker with local access to access private user data in transit

5.5 Medium

CVSS3