In Netflix OSS Hollow, since the Files.exists(parent) is run before creating the directories, an attacker can pre-create these directories with wide permissions. Additionally, since an insecure source of randomness is used, the file names to be created can be deterministically calculated.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0635 In Netflix OSS Hollow, since the Files.exists(parent) is run before creating the directories, an attacker can pre-create these directories with wide permissions. Additionally, since an insecure source of randomness is used, the file names to be created can be deterministically calculated.
Github GHSA Github GHSA GHSA-9295-mhf3-v33m Insecure temporary file in Netflix OSS Hollow
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: netflix

Published:

Updated: 2024-08-03T21:33:17.497Z

Reserved: 2021-03-09T00:00:00

Link: CVE-2021-28099

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-23T21:15:13.557

Modified: 2024-11-21T05:59:05.440

Link: CVE-2021-28099

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.