Skip to content
This repository has been archived by the owner on May 29, 2023. It is now read-only.

Local information disclosure via temporary directory

High
anantdamle published GHSA-3v72-f8c9-v75f Apr 12, 2022

Package

dswebquerytobigquery (Java)

Affected versions

<v1.0.2

Patched versions

v1.0.3

Description

Impact

What kind of vulnerability is it? Who is impacted?
On unix-like systems, the system temporary directory is shared between all users on that system. The root cause is File#createTempFile creates files in the the system temporary directory with file permissions -rw-r--r-- by default.

SA360 webquery bigquery - google/sa360-webquery-bigquery

TransferRunner contains a local information disclosure vulnerability. Any sensitive information written to theses files is visible to all other local users on unix-like systems.

Patches

Has the problem been patched? What versions should users upgrade to?
v1.0.3

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?
There is no known workaround

For more information

If you have any questions or comments about this advisory:

Severity

High

CVE ID

CVE-2021-22571

Weaknesses