
CVE-2022-41954 – Temporary File Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2022-41954
25 Nov 2022 — MPXJ is an open source library to read and write project plans from a variety of file formats and databases. On Unix-like operating systems (not Windows or macos), MPXJ's use of `File.createTempFile(..)` results in temporary files being created with the permissions `-rw-r--r--`. This means that any other user on the system can read the contents of this file. When MPXJ is reading a schedule file which requires the creation of a temporary file or directory, a knowledgeable local user could locate these transi... • https://github.com/joniles/mpxj/commit/ae0af24345d79ad45705265d9927fe55e94a5721 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-377: Insecure Temporary File CWE-668: Exposure of Resource to Wrong Sphere •

CVE-2020-35460
https://notcve.org/view.php?id=CVE-2020-35460
14 Dec 2020 — common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations. El archivo common/InputStreamHelper.java en Packwood MPXJ versiones anteriores a 8.3.5, permite un salto de directorio en el flujo del manejador de tramas zip, conllevando a una escritura de archivos en ubicaciones arbitrarias • http://www.mpxj.org/changes-report.html#a8.3.5 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2020-25020
https://notcve.org/view.php?id=CVE-2020-25020
29 Aug 2020 — MPXJ through 8.1.3 allows XXE attacks. This affects the GanttProjectReader and PhoenixReader components. MPXJ versiones hasta 8.1.3, permite ataques de tipo XXE. Esto afecta a los componentes GanttProjectReader y PhoenixReader • https://github.com/joniles/mpxj/pull/178/commits/c3e457f7a16facfe563eade82b0fa8736a8c96f9 • CWE-611: Improper Restriction of XML External Entity Reference •