CVE Vulnerabilities

CVE-2023-2976

Files or Directories Accessible to External Parties

Published: Jun 14, 2023 | Modified: Feb 13, 2024
CVSS 3.x
7.1
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
4.4 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Ubuntu
MEDIUM

Use of Javas default temporary directory for file creation in FileBackedOutputStream in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.

Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.

Weakness

The product makes files or directories accessible to unauthorized actors, even though they should not be.

Affected Software

Name Vendor Start Version End Version
Guava Google * 32.0.0 (excluding)
AMQ Broker 7.11.2 RedHat guava *
EAP 7.4.14 RedHat guava *
MTA-6.2-RHEL-8 RedHat mta/mta-rhel8-operator:6.2.2-3 *
MTA-6.2-RHEL-9 RedHat mta/mta-hub-rhel9:6.2.2-2 *
MTA-6.2-RHEL-9 RedHat mta/mta-operator-bundle:6.2.2-5 *
MTA-6.2-RHEL-9 RedHat mta/mta-pathfinder-rhel9:6.2.2-2 *
MTA-6.2-RHEL-9 RedHat mta/mta-ui-rhel9:6.2.2-2 *
MTA-6.2-RHEL-9 RedHat mta/mta-windup-addon-rhel9:6.2.2-3 *
OCP-Tools-4.12-RHEL-8 RedHat jenkins-0:2.426.3.1706515686-3.el8 *
OCP-Tools-4.12-RHEL-8 RedHat jenkins-2-plugins-0:4.12.1706515741-1.el8 *
OCP-Tools-4.14-RHEL-8 RedHat jenkins-2-plugins-0:4.14.1706516441-1.el8 *
Red Hat AMQ Streams 2.5.0 RedHat *
Red Hat AMQ Streams 2.6.0 RedHat guava *
Red Hat AMQ Streams 2.7.0 RedHat *
Red Hat build of Apache Camel 4.4.0 for Spring Boot RedHat guava *
Red Hat build of Quarkus 2.13.9.Final RedHat com.google.guava/guava:32.0.1.jre-redhat-00001 *
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 RedHat eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el8eap *
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9 RedHat eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el9eap *
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 RedHat eap7-guava-libraries-0:32.1.1-2.jre_redhat_00001.1.el7eap *
Red Hat Single Sign-On 7 RedHat guava *
Red Hat Single Sign-On 7.6 for RHEL 7 RedHat rh-sso7-keycloak-0:18.0.12-1.redhat_00001.1.el7sso *
Red Hat Single Sign-On 7.6 for RHEL 8 RedHat rh-sso7-keycloak-0:18.0.12-1.redhat_00001.1.el8sso *
Red Hat Single Sign-On 7.6 for RHEL 9 RedHat rh-sso7-keycloak-0:18.0.12-1.redhat_00001.1.el9sso *
RHEL-8 based Middleware Containers RedHat rh-sso-7/sso76-openshift-rhel8:7.6-41 *
Guava-libraries Ubuntu bionic *
Guava-libraries Ubuntu kinetic *
Guava-libraries Ubuntu lunar *
Guava-libraries Ubuntu mantic *
Guava-libraries Ubuntu trusty *
Guava-libraries Ubuntu upstream *
Guava-libraries Ubuntu xenial *

Extended Description

Web servers, FTP servers, and similar servers may store a set of files underneath a “root” directory that is accessible to the server’s users. Applications may store sensitive files underneath this root without also using access control to limit which users may request those files, if any. Alternately, an application might package multiple files or directories into an archive file (e.g., ZIP or tar), but the application might not exclude sensitive files that are underneath those directories. In cloud technologies and containers, this weakness might present itself in the form of misconfigured storage accounts that can be read or written by a public or anonymous user.

Potential Mitigations

References