Use of Javas default temporary directory for file creation in FileBackedOutputStream
in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.
Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.
The product makes files or directories accessible to unauthorized actors, even though they should not be.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Guava | * | 32.0.0 (excluding) | |
AMQ Broker 7.11.2 | RedHat | guava | * |
EAP 7.4.14 | RedHat | guava | * |
MTA-6.2-RHEL-8 | RedHat | mta/mta-rhel8-operator:6.2.2-3 | * |
MTA-6.2-RHEL-9 | RedHat | mta/mta-hub-rhel9:6.2.2-2 | * |
MTA-6.2-RHEL-9 | RedHat | mta/mta-operator-bundle:6.2.2-5 | * |
MTA-6.2-RHEL-9 | RedHat | mta/mta-pathfinder-rhel9:6.2.2-2 | * |
MTA-6.2-RHEL-9 | RedHat | mta/mta-ui-rhel9:6.2.2-2 | * |
MTA-6.2-RHEL-9 | RedHat | mta/mta-windup-addon-rhel9:6.2.2-3 | * |
OCP-Tools-4.12-RHEL-8 | RedHat | jenkins-0:2.426.3.1706515686-3.el8 | * |
OCP-Tools-4.12-RHEL-8 | RedHat | jenkins-2-plugins-0:4.12.1706515741-1.el8 | * |
OCP-Tools-4.14-RHEL-8 | RedHat | jenkins-2-plugins-0:4.14.1706516441-1.el8 | * |
Red Hat AMQ Streams 2.5.0 | RedHat | * | |
Red Hat AMQ Streams 2.6.0 | RedHat | guava | * |
Red Hat AMQ Streams 2.7.0 | RedHat | * | |
Red Hat build of Apache Camel 4.4.0 for Spring Boot | RedHat | guava | * |
Red Hat build of Quarkus 2.13.9.Final | RedHat | com.google.guava/guava:32.0.1.jre-redhat-00001 | * |
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 | RedHat | eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el8eap | * |
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9 | RedHat | eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el9eap | * |
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 | RedHat | eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap | * |
Red Hat Single Sign-On 7 | RedHat | guava | * |
Red Hat Single Sign-On 7.6 for RHEL 7 | RedHat | rh-sso7-keycloak-0:18.0.12-1.redhat_00001.1.el7sso | * |
Red Hat Single Sign-On 7.6 for RHEL 8 | RedHat | rh-sso7-keycloak-0:18.0.12-1.redhat_00001.1.el8sso | * |
Red Hat Single Sign-On 7.6 for RHEL 9 | RedHat | rh-sso7-keycloak-0:18.0.12-1.redhat_00001.1.el9sso | * |
RHEL-8 based Middleware Containers | RedHat | rh-sso-7/sso76-openshift-rhel8:7.6-41 | * |
Guava-libraries | Ubuntu | bionic | * |
Guava-libraries | Ubuntu | kinetic | * |
Guava-libraries | Ubuntu | lunar | * |
Guava-libraries | Ubuntu | mantic | * |
Guava-libraries | Ubuntu | trusty | * |
Guava-libraries | Ubuntu | upstream | * |
Guava-libraries | Ubuntu | xenial | * |
Web servers, FTP servers, and similar servers may store a set of files underneath a “root” directory that is accessible to the server’s users. Applications may store sensitive files underneath this root without also using access control to limit which users may request those files, if any. Alternately, an application might package multiple files or directories into an archive file (e.g., ZIP or tar), but the application might not exclude sensitive files that are underneath those directories. In cloud technologies and containers, this weakness might present itself in the form of misconfigured storage accounts that can be read or written by a public or anonymous user.