CVE Vulnerabilities

CVE-2023-2976

Files or Directories Accessible to External Parties

Published: Jun 14, 2023 | Modified: Nov 03, 2025
CVSS 3.x
7.1
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
4.4 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Use of Javas default temporary directory for file creation in FileBackedOutputStream in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.

Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.

Weakness

The product makes files or directories accessible to unauthorized actors, even though they should not be.

Affected Software

NameVendorStart VersionEnd Version
GuavaGoogle*32.0.0 (excluding)
AMQ Broker 7.11.2RedHatguava*
MTA-6.2-RHEL-8RedHatmta/mta-rhel8-operator:6.2.2-3*
MTA-6.2-RHEL-9RedHatmta/mta-hub-rhel9:6.2.2-2*
MTA-6.2-RHEL-9RedHatmta/mta-operator-bundle:6.2.2-5*
MTA-6.2-RHEL-9RedHatmta/mta-pathfinder-rhel9:6.2.2-2*
MTA-6.2-RHEL-9RedHatmta/mta-ui-rhel9:6.2.2-2*
MTA-6.2-RHEL-9RedHatmta/mta-windup-addon-rhel9:6.2.2-3*
OCP-Tools-4.12-RHEL-8RedHatjenkins-0:2.426.3.1706515686-3.el8*
OCP-Tools-4.12-RHEL-8RedHatjenkins-2-plugins-0:4.12.1706515741-1.el8*
OCP-Tools-4.14-RHEL-8RedHatjenkins-2-plugins-0:4.14.1706516441-1.el8*
Red Hat AMQ Streams 2.5.0RedHat*
Red Hat AMQ Streams 2.6.0RedHatguava*
Red Hat AMQ Streams 2.7.0RedHat*
Red Hat build of Apache Camel 4.4.0 for Spring BootRedHatguava*
Red Hat build of Quarkus 2.13.9.FinalRedHatcom.google.guava/guava:32.0.1.jre-redhat-00001*
Red Hat JBoss Enterprise Application Platform 7RedHatguava*
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8RedHateap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el8eap*
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9RedHateap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el9eap*
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7RedHateap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap*
Red Hat Single Sign-On 7RedHatguava*
Red Hat Single Sign-On 7.6 for RHEL 7RedHatrh-sso7-keycloak-0:18.0.12-1.redhat_00001.1.el7sso*
Red Hat Single Sign-On 7.6 for RHEL 8RedHatrh-sso7-keycloak-0:18.0.12-1.redhat_00001.1.el8sso*
Red Hat Single Sign-On 7.6 for RHEL 9RedHatrh-sso7-keycloak-0:18.0.12-1.redhat_00001.1.el9sso*
RHEL-8 based Middleware ContainersRedHatrh-sso-7/sso76-openshift-rhel8:7.6-41*
Guava-librariesUbuntubionic*
Guava-librariesUbuntuesm-apps/bionic*
Guava-librariesUbuntuesm-apps/focal*
Guava-librariesUbuntuesm-apps/jammy*
Guava-librariesUbuntuesm-apps/xenial*
Guava-librariesUbuntuesm-infra-legacy/trusty*
Guava-librariesUbuntufocal*
Guava-librariesUbuntujammy*
Guava-librariesUbuntukinetic*
Guava-librariesUbuntulunar*
Guava-librariesUbuntumantic*
Guava-librariesUbuntutrusty*
Guava-librariesUbuntutrusty/esm*
Guava-librariesUbuntuupstream*
Guava-librariesUbuntuxenial*

Extended Description

Web servers, FTP servers, and similar servers may store a set of files underneath a “root” directory that is accessible to the server’s users. Applications may store sensitive files underneath this root without also using access control to limit which users may request those files, if any. Alternately, an application might package multiple files or directories into an archive file (e.g., ZIP or tar), but the application might not exclude sensitive files that are underneath those directories. In cloud technologies and containers, this weakness might present itself in the form of misconfigured storage accounts that can be read or written by a public or anonymous user.

Potential Mitigations

References