Versio.io

CVE-2021-21290

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 08-02-2021 09:15
Last modified: - 12-05-2022 04:33
Total changes: - 23

Description

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involving an insecure temp file. When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method "File.createTempFile" on unix-like systems creates a random file, but, by default will create this file with the permissions "-rw-r--r--". Thus, if sensitive information is written to this file, other local users can read this information. This is the case in netty's "AbstractDiskHttpData" is vulnerable. This has been fixed in version 4.1.59.Final. As a workaround, one may specify your own "java.io.tmpdir" when you start the JVM or use "DefaultHttpDataFactory.setBaseDir(...)" to set the directory to something that is only readable by the current user.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Low
Attack complexity
Local
Attack vector
None
Availability
High
Confidentiality
None
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
5.5
Base score
1.8
3.6
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=netty AND product=netty AND versionEndExcluding=4.1.59
OR
vendor=Debian AND product=debian_linux AND version=9.0
vendor=Debian AND product=debian_linux AND version=10.0
OR
vendor=quarkus AND product=quarkus AND versionEndIncluding=1.13.7
OR
vendor=oracle AND product=banking_trade_finance_process_management AND version=14.3.0
vendor=oracle AND product=banking_credit_facilities_process_management AND version=14.3.0
vendor=oracle AND product=banking_corporate_lending_process_management AND version=14.3.0
vendor=oracle AND product=nosql_database AND versionEndExcluding=20.3
vendor=oracle AND product=banking_trade_finance_process_management AND version=14.5.0
vendor=oracle AND product=banking_credit_facilities_process_management AND version=14.2.0
vendor=oracle AND product=banking_credit_facilities_process_management AND version=14.5.0
vendor=oracle AND product=banking_corporate_lending_process_management AND version=14.2.0
vendor=oracle AND product=banking_corporate_lending_process_management AND version=14.5.0
vendor=oracle AND product=banking_trade_finance_process_management AND version=14.2.0
vendor=oracle AND product=communications_brm_-_elastic_charging_engine AND version=12.0.0.3
vendor=oracle AND product=communications_design_studio AND version=7.4.2
vendor=oracle AND product=communications_messaging_server AND version=8.1
OR
vendor=netapp AND product=snapcenter AND version=-
vendor=netapp AND product=active_iq_unified_manager AND version=- AND target_software=linux
vendor=netapp AND product=active_iq_unified_manager AND version=- AND target_software=windows
vendor=netapp AND product=cloud_secure_agent AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2021-21290

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.