GHSA-jrmh-v64j-mjm9:
Duplicate Advisory: Insecure Temporary File in RESTEasy
5.5
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
2/18/2023
Updated
1/15/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jboss.resteasy:resteasy-core | maven | < 4.7.8.Final | 4.7.8.Final |
org.jboss.resteasy:resteasy-core | maven | >= 5.0.0.Alpha1, < 5.0.6.Final | 5.0.6.Final |
org.jboss.resteasy:resteasy-core | maven | >= 6.0.0.Beta1, < 6.2.3.Final | 6.2.3.Final |
org.jboss.resteasy:resteasy-multipart-provider | maven | < 4.7.8.Final | 4.7.8.Final |
org.jboss.resteasy:resteasy-multipart-provider | maven | >= 5.0.0.Alpha1, < 5.0.6.Final | 5.0.6.Final |
org.jboss.resteasy:resteasy-multipart-provider | maven | >= 6.0.0.Beta1, < 6.2.3.Final | 6.2.3.Final |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability explicitly identifies DataSourceProvider
, FileProvider
, and Mime4JWorkaround
classes as using File.createTempFile()
. This method creates temporary files with insecure permissions (world-readable/writable by default), which is a known anti-pattern (CWE-378). The GitHub commit diff shows direct replacements of File.createTempFile()
with Files.createTempFile().toFile()
in multiple test classes, confirming the insecure pattern was present. While exact file paths for the main classes aren't provided, the advisory's specificity about the affected classes and the CWE mapping provide high confidence.