First published: Tue Mar 29 2022(Updated: )
On unix-like systems, the system temporary directory is shared between all users on that system. The root cause is File.createTempFile creates files in the the system temporary directory with world readable permissions. Any sensitive information written to theses files is visible to all other local users on unix-like systems. We recommend upgrading past commit https://github.com/google/data-transfer-project/pull/969
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Data Transfer Project | <0.3.57 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22572 is considered a medium severity vulnerability due to its potential to expose sensitive information to unauthorized users.
CVE-2021-22572 affects file security by allowing temporary files created in the system's temporary directory to have world readable permissions, risking data exposure.
CVE-2021-22572 impacts Unix-like systems that utilize the shared system temporary directory.
To mitigate CVE-2021-22572, avoid using the system temporary directory for sensitive data and set appropriate permissions on temporary files.
Google Data Transfer Project versions prior to 0.3.57 are vulnerable to CVE-2021-22572.