Miggo Logo

CVE-2022-45787: Apache James MIME4J vulnerable to information disclosure to local users

5.5

CVSS Score
3.1

Basic Information

EPSS Score
0.00327%
Published
1/6/2023
Updated
11/15/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.james:apache-mime4j-storagemaven< 0.8.90.8.9

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper temporary file permissions. The patch explicitly replaces File.createTempFile() with Files.createTempFile(), which has better permission controls. The original implementation's use of File.createTempFile() created files with globally readable permissions (rw-r--r--), exposing sensitive data to local users. The function createStorageOutputStream directly handled temp file creation with this vulnerable method.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Unprop*r l*xist p*rmissions on t** t*mpor*ry *il*s us** *y MIM**J T*mp*il*Stor***Provi**r m*y l*** to in*orm*tion *is*losur* to ot**r lo**l us*rs. T*is issu* *****ts *p**** J*m*s MIM**J v*rsion *.*.* *n* prior v*rsions. W* r**omm*n* us*rs to up*r***

Reasoning

T** vuln*r**ility st*ms *rom improp*r t*mpor*ry *il* p*rmissions. T** p*t** *xpli*itly r*pl***s `*il*.*r**t*T*mp*il*()` wit* `*il*s.*r**t*T*mp*il*()`, w*i** **s **tt*r p*rmission *ontrols. T** ori*in*l impl*m*nt*tion's us* o* `*il*.*r**t*T*mp*il*()`