This affects all versions of package org.nanohttpd:nanohttpd. Whenever an HTTP Session is parsing the body of an HTTP request, the body of the request is written to a RandomAccessFile when the it is larger than 1024 bytes. This file is created with insecure permissions that allow its contents to be viewed by all users on the host machine. **Workaround:** Manually specifying the -Djava.io.tmpdir= argument when launching Java to set the temporary directory to a directory exclusively controlled by the current user can fix this issue.
References
Configurations
History
21 Nov 2024, 06:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-2r85-x9cf-8fcg - Third Party Advisory | |
References | () https://github.com/NanoHttpd/nanohttpd/blob/efb2ebf85a2b06f7c508aba9eaad5377e3a01e81/core/src/main/java/org/nanohttpd/protocols/http/tempfiles/DefaultTempFile.java%23L58 - Broken Link | |
References | () https://github.com/NanoHttpd/nanohttpd/blob/efb2ebf85a2b06f7c508aba9eaad5377e3a01e81/core/src/main/java/org/nanohttpd/protocols/http/tempfiles/DefaultTempFileManager.java%23L60 - Broken Link | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGNANOHTTPD-2422798 - Third Party Advisory |
Information
Published : 2022-05-01 16:15
Updated : 2024-11-21 06:44
NVD link : CVE-2022-21230
Mitre link : CVE-2022-21230
CVE.ORG link : CVE-2022-21230
JSON object : View
Products Affected
nanohttpd
- nanohttpd
CWE