First published: Tue Jun 24 2014(Updated: )
JClouds scriptbuilder Statements.java writes a temporary file to a predictable location. An attacker could use this flaw to access sensitive data, denial of service, or other attacks. <a href="http://seclists.org/oss-sec/2014/q2/579">http://seclists.org/oss-sec/2014/q2/579</a> <a href="https://issues.apache.org/jira/browse/JCLOUDS-612">https://issues.apache.org/jira/browse/JCLOUDS-612</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Apache JClouds |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1112877 is considered to be high due to potential risks of data exposure and denial of service.
To fix REDHAT-BUG-1112877, you should update Apache jclouds to the latest version where the vulnerability has been resolved.
With REDHAT-BUG-1112877, sensitive data may be at risk of unauthorized access due to the predictable temporary file location.
Apache jclouds users are affected by REDHAT-BUG-1112877 if they utilize the vulnerable scriptbuilder Statements.java feature.
Yes, REDHAT-BUG-1112877 can potentially lead to a denial of service attack if exploited by an attacker leveraging the predictable temporary file location.