First published: Tue Jan 31 2023(Updated: )
# Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-2c6g-pfx3-w7h8. This link is maintained to preserve external references. # Original Description In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-resteasy | <0:3.15.5-1.Final_redhat_00001.1.el8ea | 0:3.15.5-1.Final_redhat_00001.1.el8ea |
redhat/eap7-resteasy | <0:3.15.5-1.Final_redhat_00001.1.el9ea | 0:3.15.5-1.Final_redhat_00001.1.el9ea |
redhat/eap7-resteasy | <0:3.15.5-1.Final_redhat_00001.1.el7ea | 0:3.15.5-1.Final_redhat_00001.1.el7ea |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el7 | 0:18.0.7-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el8 | 0:18.0.7-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el9 | 0:18.0.7-1.redhat_00001.1.el9 |
redhat/RESTEasy | <4.7.8. | 4.7.8. |
maven/org.jboss.resteasy:resteasy-core | <3.15.4.Final | 3.15.5.Final |
maven/org.jboss.resteasy:resteasy-multipart-provider | <3.15.4.Final | 3.15.5.Final |
maven/org.jboss.resteasy:resteasy-multipart-provider | >=4.0.0.Beta1<4.7.8.Final | 4.7.8.Final |
maven/org.jboss.resteasy:resteasy-multipart-provider | >=5.0.0.Alpha1<5.0.6.Final | 5.0.6.Final |
maven/org.jboss.resteasy:resteasy-multipart-provider | >=6.0.0.Beta1<6.2.3.Final | 6.2.3.Final |
maven/org.jboss.resteasy:resteasy-core | >=4.0.0.Beta1<4.7.8.Final | 4.7.8.Final |
maven/org.jboss.resteasy:resteasy-core | >=5.0.0.Alpha1<5.0.6.Final | 5.0.6.Final |
maven/org.jboss.resteasy:resteasy-core | >=6.0.0.Beta1<6.2.3.Final | 6.2.3.Final |
maven/org.jboss.resteasy:resteasy-multipart-provider | <4.7.8.Final | 4.7.8.Final |
maven/org.jboss.resteasy:resteasy-core | <4.7.8.Final | 4.7.8.Final |
Red Hat RESTEasy | <4.7.8 | |
IBM Watson Knowledge Catalog | <=4.x | |
Red Hat RESTEasy | =3.15.4 | |
Red Hat RESTEasy | =4.7.7 | |
Red Hat RESTEasy | =5.0.5 | |
Red Hat RESTEasy | =6.2.2 | |
NetApp Active IQ Unified Manager | ||
netapp active iq unified manager vsphere | ||
netapp active iq unified manager windows | ||
NetApp OnCommand Workflow Automation |
https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2023-0482.
The severity of CVE-2023-0482 is medium, with a severity value of 5.3.
RESTEasy, eap7-resteasy, rh-sso7-keycloak, Redhat Resteasy, and IBM Watson Knowledge Catalog on-prem are affected by CVE-2023-0482.
A local authenticated attacker can exploit CVE-2023-0482 by sending a specially-crafted request.
Yes, patches or fixes are available. Please refer to the following references for more information: [link1](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2170572), [link2](https://access.redhat.com/errata/RHSA-2023:1514), [link3](https://access.redhat.com/errata/RHSA-2023:1513).