CVE-2023-2976
Use of temporary directory for file creation in `FileBackedOutputStream` in Guava
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.
Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.
A flaw was found in Guava. The methodology for temporary directories and files can allow other local users or apps with accordant permissions to access the temp files, possibly leading to information exposure or tampering in the files created in the directory.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-05-30 CVE Reserved
- 2023-06-14 CVE Published
- 2024-02-14 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-552: Files or Directories Accessible to External Parties
CAPEC
- CAPEC-212: Functionality Misuse
References (5)
URL | Tag | Source |
---|---|---|
https://security.netapp.com/advisory/ntap-20230818-0008 | ||
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01006.html |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/google/guava/issues/2575 | 2024-02-13 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-2976 | 2024-05-30 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2215229 | 2024-05-30 |