imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it.
References
Link Resource
https://github.com/imapsync/imapsync/issues/399 Exploit Issue Tracking Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2023-05-30T00:00:00

Updated: 2023-05-30T00:00:00

Reserved: 2023-05-30T00:00:00


Link: CVE-2023-34204

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-05-30T04:15:10.317

Modified: 2023-06-07T16:01:59.353


Link: CVE-2023-34204

JSON object: View

cve-icon Redhat Information

No data.

CWE