First published: Tue Jan 31 2023(Updated: )
In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Watson Knowledge Catalog on-prem | <=4.x | |
Redhat Resteasy | <4.7.8 | |
redhat/eap7-resteasy | <0:3.15.5-1.Final_redhat_00001.1.el8ea | 0:3.15.5-1.Final_redhat_00001.1.el8ea |
redhat/eap7-resteasy | <0:3.15.5-1.Final_redhat_00001.1.el9ea | 0:3.15.5-1.Final_redhat_00001.1.el9ea |
redhat/eap7-resteasy | <0:3.15.5-1.Final_redhat_00001.1.el7ea | 0:3.15.5-1.Final_redhat_00001.1.el7ea |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el7 | 0:18.0.7-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el8 | 0:18.0.7-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el9 | 0:18.0.7-1.redhat_00001.1.el9 |
https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2023-0482.
The severity of CVE-2023-0482 is medium, with a severity value of 5.3.
RESTEasy, eap7-resteasy, rh-sso7-keycloak, Redhat Resteasy, and IBM Watson Knowledge Catalog on-prem are affected by CVE-2023-0482.
A local authenticated attacker can exploit CVE-2023-0482 by sending a specially-crafted request.
Yes, patches or fixes are available. Please refer to the following references for more information: [link1](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2170572), [link2](https://access.redhat.com/errata/RHSA-2023:1514), [link3](https://access.redhat.com/errata/RHSA-2023:1513).