Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-2817

Опубликовано: 19 фев. 2026
Источник: redhat
CVSS3: 4.4

Описание

Use of insecure directory in Spring Data Geode snapshot import extracts archives into predictable, permissive directories under the system temp location. On shared hosts, a local user with basic privileges can access another user’s extracted snapshot contents, leading to unintended exposure of cache data.

A flaw was found in Spring Data Geode. A local user with basic privileges on a shared host can exploit an insecure directory used during snapshot import. This vulnerability allows the system to extract archives into predictable and permissive temporary directories, enabling the local user to access another user’s extracted snapshot contents. This leads to the unintended exposure of sensitive cache data.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7spring-data-geodeFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-379
https://bugzilla.redhat.com/show_bug.cgi?id=2441042org.springframework.data/spring-data-geode: Spring Data Geode: Information disclosure via insecure temporary directory for snapshot imports

4.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.4
nvd
около 1 месяца назад

Use of insecure directory in Spring Data Geode snapshot import extracts archives into predictable, permissive directories under the system temp location. On shared hosts, a local user with basic privileges can access another user’s extracted snapshot contents, leading to unintended exposure of cache data.

CVSS3: 4.4
github
около 1 месяца назад

Use of insecure directory in Spring Data Geode snapshot import extracts archives into predictable, permissive directories under the system temp location. On shared hosts, a local user with basic privileges can access another user’s extracted snapshot contents, leading to unintended exposure of cache data.

4.4 Medium

CVSS3