vulnerability
Red Hat JBoss EAP: CVE-2023-2976: Files or Directories Accessible to External Parties
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
3 | (AV:L/AC:L/Au:S/C:P/I:P/A:N) | Jun 14, 2023 | Sep 19, 2024 | Jul 9, 2025 |
Severity
3
CVSS
(AV:L/AC:L/Au:S/C:P/I:P/A:N)
Published
Jun 14, 2023
Added
Sep 19, 2024
Modified
Jul 9, 2025
Description
Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.
Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.. A flaw was found in Guava. The methodology for temporary directories and files can allow other local users or apps with accordant permissions to access the temp files, possibly leading to information exposure or tampering in the files created in the directory.
Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.. A flaw was found in Guava. The methodology for temporary directories and files can allow other local users or apps with accordant permissions to access the temp files, possibly leading to information exposure or tampering in the files created in the directory.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-552
- CVE-2023-2976
- https://attackerkb.com/topics/CVE-2023-2976
- URL-https://access.redhat.com/security/cve/CVE-2023-2976
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2215229
- URL-https://access.redhat.com/errata/RHSA-2023:7637
- URL-https://access.redhat.com/errata/RHSA-2023:7638
- URL-https://access.redhat.com/errata/RHSA-2023:7639
- URL-https://access.redhat.com/errata/RHSA-2023:7641

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.