imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it.
References
Link | Resource |
---|---|
https://github.com/imapsync/imapsync/issues/399 | Exploit Issue Tracking Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-05-30T00:00:00
Updated: 2023-05-30T00:00:00
Reserved: 2023-05-30T00:00:00
Link: CVE-2023-34204
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-05-30T04:15:10.317
Modified: 2023-06-07T16:01:59.353
Link: CVE-2023-34204
JSON object: View
Redhat Information
No data.
CWE