google guava 关键资源的不正确权限授予

admin 2023-12-01 17:43:11 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
低危 google guava 关键资源的不正确权限授予

CVE编号

CVE-2020-8908

利用情况

暂无

补丁情况

官方补丁

披露时间

2020-12-11
漏洞描述
Google Guava是美国谷歌(Google)公司的一款包括图形库、函数类型、I/O和字符串处理等的Java核心库。 Guava 30.0版本之前存在访问控制错误漏洞,该漏洞源于Guava存在一个临时目录创建漏洞,允许访问机器的攻击者可利用该漏洞潜在地访问由Guava com.google.common.io.Files.createTempDir()创建的临时目录中的数据。攻击者可以利用该漏洞访问特殊目录。
解决建议
厂商已发布了漏洞修复程序,请及时关注更新:https://github.com/google/guava/issues/4011
参考链接
https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40
https://github.com/google/guava/issues/4011
https://lists.apache.org/thread.html/r007add131977f4f576c232b25e024249a3d16f6...
https://lists.apache.org/thread.html/r007add131977f4f576c232b25e024249a3d16f6...
https://lists.apache.org/thread.html/r07ed3e4417ad043a27bee7bb33322e9bfc7d7e6...
https://lists.apache.org/thread.html/r07ed3e4417ad043a27bee7bb33322e9bfc7d7e6...
https://lists.apache.org/thread.html/r161b87f8037bbaff400194a63cd2016c9a69f59...
https://lists.apache.org/thread.html/r161b87f8037bbaff400194a63cd2016c9a69f59...
https://lists.apache.org/thread.html/r215b3d50f56faeb2f9383505f3e62faa9f549bb...
https://lists.apache.org/thread.html/r294be9d31c0312d2c0837087204b5d4bf49d055...
https://lists.apache.org/thread.html/r294be9d31c0312d2c0837087204b5d4bf49d055...
https://lists.apache.org/thread.html/r2fe45d96eea8434b91592ca08109118f6308d60...
https://lists.apache.org/thread.html/r2fe45d96eea8434b91592ca08109118f6308d60...
https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328c...
https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328c...
https://lists.apache.org/thread.html/r3dd8881de891598d622227e9840dd7c2ef1d08a...
https://lists.apache.org/thread.html/r4776f62dfae4a0006658542f43034a7fc199350...
https://lists.apache.org/thread.html/r49549a8322f62cd3acfa4490d25bfba0be04f3f...
https://lists.apache.org/thread.html/r49549a8322f62cd3acfa4490d25bfba0be04f3f...
https://lists.apache.org/thread.html/r58a8775205ab1839dba43054b09a9ab3b25b423...
https://lists.apache.org/thread.html/r58a8775205ab1839dba43054b09a9ab3b25b423...
https://lists.apache.org/thread.html/r5b3d93dfdfb7708e796e8762ab40edbde8ff8ad...
https://lists.apache.org/thread.html/r5d61b98ceb7bba939a651de5900dbd67be3817d...
https://lists.apache.org/thread.html/r5d61b98ceb7bba939a651de5900dbd67be3817d...
https://lists.apache.org/thread.html/r6874dfe26eefc41b7c9a5e4a0487846fc4accf8...
https://lists.apache.org/thread.html/r6874dfe26eefc41b7c9a5e4a0487846fc4accf8...
https://lists.apache.org/thread.html/r68d86f4b06c808204f62bcb254fcb5b0432528e...
https://lists.apache.org/thread.html/r79e47ed555bdb1180e528420a7a2bb898541367...
https://lists.apache.org/thread.html/r79e47ed555bdb1180e528420a7a2bb898541367...
https://lists.apache.org/thread.html/r7b0e81d8367264d6cad98766a469d64d11248eb...
https://lists.apache.org/thread.html/r7b0e81d8367264d6cad98766a469d64d11248eb...
https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a056...
https://lists.apache.org/thread.html/ra7ab308481ee729f998691e8e3e02e93b1dedfc...
https://lists.apache.org/thread.html/ra7ab308481ee729f998691e8e3e02e93b1dedfc...
https://lists.apache.org/thread.html/rb2364f4cf4d274eab5a7ecfaf64bf575cedf8b0...
https://lists.apache.org/thread.html/rb2364f4cf4d274eab5a7ecfaf64bf575cedf8b0...
https://lists.apache.org/thread.html/rb8c0f1b7589864396690fe42a91a71dea9412e8...
https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99...
https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a...
https://lists.apache.org/thread.html/rc607bc52f3507b8b9c28c6a747c3122f51ac24a...
https://lists.apache.org/thread.html/rcafc3a637d82bdc9a24036b2ddcad1e519dd0e6...
https://lists.apache.org/thread.html/rcafc3a637d82bdc9a24036b2ddcad1e519dd0e6...
https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce637...
https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce637...
https://lists.apache.org/thread.html/rd2704306ec729ccac726e50339b8a8f079515cc...
https://lists.apache.org/thread.html/rd2704306ec729ccac726e50339b8a8f079515cc...
https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c...
https://lists.apache.org/thread.html/rd7e12d56d49d73e2b8549694974b07561b79b05...
https://lists.apache.org/thread.html/re120f6b3d2f8222121080342c5801fdafca2f51...
https://lists.apache.org/thread.html/re120f6b3d2f8222121080342c5801fdafca2f51...
https://lists.apache.org/thread.html/reebbd63c25bc1a946caa419cec2be78079f8449...
https://lists.apache.org/thread.html/reebbd63c25bc1a946caa419cec2be78079f8449...
https://lists.apache.org/thread.html/rf00b688ffa620c990597f829ff85fdbba8bf73e...
https://lists.apache.org/thread.html/rf00b688ffa620c990597f829ff85fdbba8bf73e...
https://lists.apache.org/thread.html/rf9f0fa84b8ae1a285f0210bafec6de2a9eba083...
https://lists.apache.org/thread.html/rf9f0fa84b8ae1a285f0210bafec6de2a9eba083...
https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f...
https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f...
https://security.netapp.com/advisory/ntap-20220210-0003/
https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 google guava * Up to (excluding) 30.0
运行在以下环境
系统 debian_10 guava-libraries * Up to (including) 19.0-1
运行在以下环境
系统 debian_11 guava-libraries * Up to (including) 29.0-6
运行在以下环境
系统 debian_12 guava-libraries * Up to (including) 31.1-1
运行在以下环境
系统 debian_sid guava-libraries * Up to (excluding) 32.0.1-1
运行在以下环境
系统 fedora_35 apache-commons-beanutils-javadoc * Up to (excluding) 1.9.4-6.fc35
运行在以下环境
系统 kylinos_aarch64_V10SP2 guava20 * Up to (excluding) 25.0-5.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 guava20 * Up to (excluding) 25.0-5.ky10
运行在以下环境
系统 opensuse_Leap_15.4 guava-javadoc * Up to (excluding) 32.0.1-150200.3.7.1
运行在以下环境
系统 opensuse_Leap_15.5 guava-javadoc * Up to (excluding) 32.0.1-150200.3.7.1
阿里云评分 3.4
  • 攻击路径 远程
  • 攻击复杂度 容易
  • 权限要求 无需权限
  • 影响范围 有限影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-732 关键资源的不正确权限授予
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0