imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 28 May 2025 16:45:00 +0000

Type Values Removed Values Added
References

Thu, 22 May 2025 02:30:00 +0000


Fri, 10 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-01-10T20:46:24.049Z

Reserved: 2023-05-30T00:00:00

Link: CVE-2023-34204

cve-icon Vulnrichment

Updated: 2024-08-02T16:01:54.253Z

cve-icon NVD

Status : Modified

Published: 2023-05-30T04:15:10.317

Modified: 2025-01-10T21:15:12.553

Link: CVE-2023-34204

cve-icon Redhat

Severity : Low

Publid Date: 2023-05-30T00:00:00Z

Links: CVE-2023-34204 - Bugzilla

cve-icon OpenCVE Enrichment

No data.