CWE-377
Insecure Temporary File
Creating and using insecure temporary files can leave application and system data vulnerable to attack.
CVE-2011-4119 (GCVE-0-2011-4119)
Vulnerability from cvelistv5
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | caml-light |
Version: caml-light <= 0.75 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:01:50.576Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://seclists.org/oss-sec/2011/q4/249" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuxml.freebsd.org/freebsd/9dde9dac-08f4-11e1-af36-003067b2972c.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://gnats.netbsd.org/45558" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "caml-light", "vendor": "n/a", "versions": [ { "status": "affected", "version": "caml-light \u003c= 0.75" } ] } ], "descriptions": [ { "lang": "en", "value": "caml-light \u003c= 0.75 uses mktemp() insecurely, and also does unsafe things in /tmp during make install." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-377", "description": "CWE-377", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-26T12:11:15", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://seclists.org/oss-sec/2011/q4/249" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vuxml.freebsd.org/freebsd/9dde9dac-08f4-11e1-af36-003067b2972c.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://gnats.netbsd.org/45558" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4119", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "caml-light", "version": { "version_data": [ { "version_value": "caml-light \u003c= 0.75" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "caml-light \u003c= 0.75 uses mktemp() insecurely, and also does unsafe things in /tmp during make install." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-377" } ] } ] }, "references": { "reference_data": [ { "name": "https://seclists.org/oss-sec/2011/q4/249", "refsource": "MISC", "url": "https://seclists.org/oss-sec/2011/q4/249" }, { "name": "https://vuxml.freebsd.org/freebsd/9dde9dac-08f4-11e1-af36-003067b2972c.html", "refsource": "MISC", "url": "https://vuxml.freebsd.org/freebsd/9dde9dac-08f4-11e1-af36-003067b2972c.html" }, { "name": "http://gnats.netbsd.org/45558", "refsource": "MISC", "url": "http://gnats.netbsd.org/45558" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-4119", "datePublished": "2021-10-26T12:11:15", "dateReserved": "2011-10-18T00:00:00", "dateUpdated": "2024-08-07T00:01:50.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2666 (GCVE-0-2012-2666)
Vulnerability from cvelistv5
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:42:31.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2012-2666" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=765455" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/golang/go/commit/8ac275bb01588a8c0e6c0fe2de7fd11f08feccdd" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://codereview.appspot.com/5992078" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210902-0009/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "go/golang", "vendor": "n/a", "versions": [ { "status": "affected", "version": "go/golang 1.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "golang/go in 1.0.2 fixes all.bash on shared machines. dotest() in src/pkg/debug/gosym/pclntab_test.go creates a temporary file with predicable name and executes it as shell script." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-377", "description": "CWE-377", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-02T08:06:40", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2012-2666" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=765455" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/golang/go/commit/8ac275bb01588a8c0e6c0fe2de7fd11f08feccdd" }, { "tags": [ "x_refsource_MISC" ], "url": "https://codereview.appspot.com/5992078" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210902-0009/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-2666", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "go/golang", "version": { "version_data": [ { "version_value": "go/golang 1.0.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "golang/go in 1.0.2 fixes all.bash on shared machines. dotest() in src/pkg/debug/gosym/pclntab_test.go creates a temporary file with predicable name and executes it as shell script." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-377" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2012-2666", "refsource": "MISC", "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2012-2666" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=765455", "refsource": "MISC", "url": "https://bugzilla.suse.com/show_bug.cgi?id=765455" }, { "name": "https://github.com/golang/go/commit/8ac275bb01588a8c0e6c0fe2de7fd11f08feccdd", "refsource": "MISC", "url": "https://github.com/golang/go/commit/8ac275bb01588a8c0e6c0fe2de7fd11f08feccdd" }, { "name": "https://codereview.appspot.com/5992078", "refsource": "MISC", "url": "https://codereview.appspot.com/5992078" }, { "name": "https://security.netapp.com/advisory/ntap-20210902-0009/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210902-0009/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2666", "datePublished": "2021-07-09T10:50:05", "dateReserved": "2012-05-14T00:00:00", "dateUpdated": "2024-08-06T19:42:31.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4253 (GCVE-0-2013-4253)
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Red Hat Openshift |
Version: Red Hat Openshift 1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.711Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2014/06/05/19" }, { "tags": [ "x_transferred" ], "url": "https://github.com/openshift/openshift-extras/blob/enterprise-2.0/README.md#security-notice" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2013-4253", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-09T15:11:53.607730Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-09T15:12:23.342Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Red Hat Openshift", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Red Hat Openshift 1" } ] } ], "descriptions": [ { "lang": "en", "value": "The deployment script in the unsupported \"OpenShift Extras\" set of add-on scripts, in Red Hat Openshift 1, installs a default public key in the root user\u0027s authorized_keys file." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-377", "description": "CWE-377", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-19T00:00:00.000Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.openwall.com/lists/oss-security/2014/06/05/19" }, { "url": "https://github.com/openshift/openshift-extras/blob/enterprise-2.0/README.md#security-notice" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4253", "datePublished": "2022-10-19T00:00:00.000Z", "dateReserved": "2013-06-12T00:00:00.000Z", "dateUpdated": "2025-05-09T15:12:23.342Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4561 (GCVE-0-2013-4561)
Vulnerability from cvelistv5
► | URL | Tags |
---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | openshift-origin-msg-node-mcollective |
Version: openshift-origin-msg-node-mcollective as shipped with Red Hat OpenShift Online and OpenShift Enterprise 1.x. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:15.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1029652" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/openshift/origin-server/commit/f1abe972794e35a4bfba597694ce829990f14d39" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "openshift-origin-msg-node-mcollective", "vendor": "n/a", "versions": [ { "status": "affected", "version": "openshift-origin-msg-node-mcollective as shipped with Red Hat OpenShift Online and OpenShift Enterprise 1.x." } ] } ], "descriptions": [ { "lang": "en", "value": "In a openshift node, there is a cron job to update mcollective facts that mishandles a temporary file. This may lead to loss of confidentiality and integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-377", "description": "CWE-377", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-30T18:40:58", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1029652" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openshift/origin-server/commit/f1abe972794e35a4bfba597694ce829990f14d39" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4561", "datePublished": "2022-06-30T18:40:58", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:15.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-9595 (GCVE-0-2016-9595)
Vulnerability from cvelistv5
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Foreman | katello-debug |
Version: 3.4.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:59:02.231Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:0336", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0336" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9595" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "katello-debug", "vendor": "Foreman", "versions": [ { "status": "affected", "version": "3.4.0" } ] } ], "datePublic": "2018-07-27T00:00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in katello-debug before 3.4.0 where certain scripts and log files used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-377", "description": "CWE-377", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-28T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2018:0336", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0336" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9595" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-9595", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "katello-debug", "version": { "version_data": [ { "version_value": "3.4.0" } ] } } ] }, "vendor_name": "Foreman" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in katello-debug before 3.4.0 where certain scripts and log files used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], [ { "vectorString": "6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-377" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:0336", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0336" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9595", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9595" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-9595", "datePublished": "2018-07-27T18:00:00", "dateReserved": "2016-11-23T00:00:00", "dateUpdated": "2024-08-06T02:59:02.231Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-15111 (GCVE-0-2017-15111)
Vulnerability from cvelistv5
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
jdennis | keycloak-httpd-client-install |
Version: before 0.8 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:15.610Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/jdennis/keycloak-httpd-client-install/commit/07f26e213196936fb328ea0c1d5a66a09d8b5440" }, { "name": "RHSA-2019:2137", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2137" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "keycloak-httpd-client-install", "vendor": "jdennis", "versions": [ { "status": "affected", "version": "before 0.8" } ] } ], "datePublic": "2018-01-05T00:00:00", "descriptions": [ { "lang": "en", "value": "keycloak-httpd-client-install versions before 0.8 insecurely creates temporary file allowing local attackers to overwrite other files via symbolic link." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-377", "description": "CWE-377", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-06T16:06:30", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/jdennis/keycloak-httpd-client-install/commit/07f26e213196936fb328ea0c1d5a66a09d8b5440" }, { "name": "RHSA-2019:2137", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2137" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "DATE_PUBLIC": "2018-01-05T00:00:00", "ID": "CVE-2017-15111", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "keycloak-httpd-client-install", "version": { "version_data": [ { "version_value": "before 0.8" } ] } } ] }, "vendor_name": "jdennis" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "keycloak-httpd-client-install versions before 0.8 insecurely creates temporary file allowing local attackers to overwrite other files via symbolic link." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-377" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/jdennis/keycloak-httpd-client-install/commit/07f26e213196936fb328ea0c1d5a66a09d8b5440", "refsource": "CONFIRM", "url": "https://github.com/jdennis/keycloak-httpd-client-install/commit/07f26e213196936fb328ea0c1d5a66a09d8b5440" }, { "name": "RHSA-2019:2137", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2137" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-15111", "datePublished": "2018-01-20T00:00:00Z", "dateReserved": "2017-10-08T00:00:00", "dateUpdated": "2024-09-17T02:26:44.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-16024 (GCVE-0-2017-16024)
Vulnerability from cvelistv5
- CWE-377 - Insecure Temporary File ()
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
HackerOne | sync-exec node module |
Version: All versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:13:06.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cwe.mitre.org/data/definitions/377.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.owasp.org/index.php/Insecure_Temporary_File" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/gvarsanyi/sync-exec/issues/17" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://nodesecurity.io/advisories/310" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "sync-exec node module", "vendor": "HackerOne", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "datePublic": "2018-04-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The sync-exec module is used to simulate child_process.execSync in node versions \u003c0.11.9. Sync-exec uses tmp directories as a buffer before returning values. Other users on the server have read access to the tmp directory, possibly allowing an attacker on the server to obtain confidential information from the buffer/tmp file, while it exists." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-377", "description": "Insecure Temporary File (CWE-377)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-04T18:57:01", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cwe.mitre.org/data/definitions/377.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.owasp.org/index.php/Insecure_Temporary_File" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/gvarsanyi/sync-exec/issues/17" }, { "tags": [ "x_refsource_MISC" ], "url": "https://nodesecurity.io/advisories/310" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "DATE_PUBLIC": "2018-04-26T00:00:00", "ID": "CVE-2017-16024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "sync-exec node module", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "HackerOne" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The sync-exec module is used to simulate child_process.execSync in node versions \u003c0.11.9. Sync-exec uses tmp directories as a buffer before returning values. Other users on the server have read access to the tmp directory, possibly allowing an attacker on the server to obtain confidential information from the buffer/tmp file, while it exists." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insecure Temporary File (CWE-377)" } ] } ] }, "references": { "reference_data": [ { "name": "https://cwe.mitre.org/data/definitions/377.html", "refsource": "MISC", "url": "https://cwe.mitre.org/data/definitions/377.html" }, { "name": "https://www.owasp.org/index.php/Insecure_Temporary_File", "refsource": "MISC", "url": "https://www.owasp.org/index.php/Insecure_Temporary_File" }, { "name": "https://github.com/gvarsanyi/sync-exec/issues/17", "refsource": "MISC", "url": "https://github.com/gvarsanyi/sync-exec/issues/17" }, { "name": "https://nodesecurity.io/advisories/310", "refsource": "MISC", "url": "https://nodesecurity.io/advisories/310" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2017-16024", "datePublished": "2018-06-04T19:00:00Z", "dateReserved": "2017-10-29T00:00:00", "dateUpdated": "2024-09-16T17:48:58.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-7549 (GCVE-0-2017-7549)
Vulnerability from cvelistv5
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Red Hat, Inc. | instack-undercloud |
Version: Pike, 12: v7.2.0, Ocata, 11: v6.1.0, Newton, 10: v5.3.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:04:12.059Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2017:2726", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2726" }, { "name": "100407", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100407" }, { "name": "RHSA-2017:2649", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2649" }, { "name": "RHSA-2017:2687", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2687" }, { "name": "RHSA-2017:2557", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2557" }, { "name": "RHSA-2017:2693", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2693" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477403" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "instack-undercloud", "vendor": "Red Hat, Inc.", "versions": [ { "status": "affected", "version": "Pike, 12: v7.2.0, Ocata, 11: v6.1.0, Newton, 10: v5.3.0" } ] } ], "datePublic": "2017-08-14T00:00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in instack-undercloud 7.2.0 as packaged in Red Hat OpenStack Platform Pike, 6.1.0 as packaged in Red Hat OpenStack Platform Oacta, 5.3.0 as packaged in Red Hat OpenStack Newton, where pre-install and security policy scripts used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-377", "description": "CWE-377", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2017:2726", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2726" }, { "name": "100407", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100407" }, { "name": "RHSA-2017:2649", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2649" }, { "name": "RHSA-2017:2687", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2687" }, { "name": "RHSA-2017:2557", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2557" }, { "name": "RHSA-2017:2693", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2693" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477403" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-7549", "datePublished": "2017-09-21T20:00:00Z", "dateReserved": "2017-04-05T00:00:00", "dateUpdated": "2024-08-05T16:04:12.059Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-7560 (GCVE-0-2017-7560)
Vulnerability from cvelistv5
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Red Hat, Inc. | rhnsd |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:04:12.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480550" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "rhnsd", "vendor": "Red Hat, Inc.", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-08-11T00:00:00", "descriptions": [ { "lang": "en", "value": "It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-377", "description": "CWE-377", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-13T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480550" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-7560", "datePublished": "2017-09-13T17:00:00Z", "dateReserved": "2017-04-05T00:00:00", "dateUpdated": "2024-08-05T16:04:12.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-1053 (GCVE-0-2018-1053)
Vulnerability from cvelistv5
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
The PostgreSQL Global Development Group | postgresql |
Version: 9.3.x before 9.3.21 Version: 9.4.x before 9.4.16 Version: 9.5.x before 9.5.11 Version: 9.6.x before 9.6.7 Version: 10.x before 10.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:44:11.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.postgresql.org/about/news/1829/" }, { "name": "RHSA-2018:2511", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2511" }, { "name": "[debian-lts-announce] 20180207 [SECURITY] [DLA-1271-1] postgresql-9.1 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00006.html" }, { "name": "RHSA-2018:2566", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2566" }, { "name": "RHSA-2018:3816", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3816" }, { "name": "102986", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102986" }, { "name": "USN-3564-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3564-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "postgresql", "vendor": "The PostgreSQL Global Development Group", "versions": [ { "status": "affected", "version": "9.3.x before 9.3.21" }, { "status": "affected", "version": "9.4.x before 9.4.16" }, { "status": "affected", "version": "9.5.x before 9.5.11" }, { "status": "affected", "version": "9.6.x before 9.6.7" }, { "status": "affected", "version": "10.x before 10.2" } ] } ], "datePublic": "2018-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-377", "description": "CWE-377", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-14T10:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.postgresql.org/about/news/1829/" }, { "name": "RHSA-2018:2511", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2511" }, { "name": "[debian-lts-announce] 20180207 [SECURITY] [DLA-1271-1] postgresql-9.1 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00006.html" }, { "name": "RHSA-2018:2566", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2566" }, { "name": "RHSA-2018:3816", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3816" }, { "name": "102986", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102986" }, { "name": "USN-3564-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3564-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "DATE_PUBLIC": "2018-02-08T00:00:00", "ID": "CVE-2018-1053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "postgresql", "version": { "version_data": [ { "version_value": "9.3.x before 9.3.21" }, { "version_value": "9.4.x before 9.4.16" }, { "version_value": "9.5.x before 9.5.11" }, { "version_value": "9.6.x before 9.6.7" }, { "version_value": "10.x before 10.2" } ] } } ] }, "vendor_name": "The PostgreSQL Global Development Group" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-377" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.postgresql.org/about/news/1829/", "refsource": "CONFIRM", "url": "https://www.postgresql.org/about/news/1829/" }, { "name": "RHSA-2018:2511", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2511" }, { "name": "[debian-lts-announce] 20180207 [SECURITY] [DLA-1271-1] postgresql-9.1 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00006.html" }, { "name": "RHSA-2018:2566", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2566" }, { "name": "RHSA-2018:3816", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3816" }, { "name": "102986", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102986" }, { "name": "USN-3564-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3564-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-1053", "datePublished": "2018-02-09T14:00:00Z", "dateReserved": "2017-12-04T00:00:00", "dateUpdated": "2024-09-17T04:20:15.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
No mitigation information available for this CWE.
CAPEC-149: Explore for Predictable Temporary File Names
An attacker explores a target to identify the names and locations of predictable temporary files for the purpose of launching further attacks against the target. This involves analyzing naming conventions and storage locations of the temporary files created by a target application. If an attacker can predict the names of temporary files they can use this information to mount other attacks, such as information gathering and symlink attacks.
CAPEC-155: Screen Temporary Files for Sensitive Information
An adversary exploits the temporary, insecure storage of information by monitoring the content of files used to store temp data during an application's routine execution flow. Many applications use temporary files to accelerate processing or to provide records of state across multiple executions of the application. Sometimes, however, these temporary files may end up storing sensitive information. By screening an application's temporary files, an adversary might be able to discover such sensitive information. For example, web browsers often cache content to accelerate subsequent lookups. If the content contains sensitive information then the adversary could recover this from the web cache.