imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it.
History

Fri, 10 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2023-05-30T00:00:00

Updated: 2025-01-10T20:46:24.049Z

Reserved: 2023-05-30T00:00:00

Link: CVE-2023-34204

cve-icon Vulnrichment

Updated: 2024-08-02T16:01:54.253Z

cve-icon NVD

Status : Modified

Published: 2023-05-30T04:15:10.317

Modified: 2025-01-10T21:15:12.553

Link: CVE-2023-34204

cve-icon Redhat

Severity : Low

Publid Date: 2023-05-30T00:00:00Z

Links: CVE-2023-34204 - Bugzilla