Guava vulnerable to insecure use of temporary directory

Description

Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.

Even though the security vulnerability is fixed in version 32.0.0, maintainers recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.

Repository: OpenNMS/pris-plugin (https://github.com/OpenNMS/pris-plugin)
Dependabot: https://github.com/OpenNMS/pris-plugin/security/dependabot/6
CVE: CVE-2023-2976
CVSS: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
GHSA: GHSA-7g45-4rm6-3mm3
Severity: medium
Ecosystem: maven
Package Name: com.google.guava:guava
Vulnerable Version Range: >= 1.0, < 32.0.0
First Patched Version: 32.0.0

Activity

Show:

chiuen (Qun) July 28, 2023 at 5:21 PM

Infosec evaluated at the following risk:

CVSS: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:U/CR:H/IR:H/AR:H/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X

CVSS Score: 6.3 x likelihood 0.5 = 3.2 low

Details

Assignee

Reporter

Priority

PagerDuty

Created July 21, 2023 at 10:35 PM
Updated July 28, 2023 at 5:21 PM

Flag notifications