Description
imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-38303 | imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it. |
References
History
Wed, 28 May 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Fri, 10 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-10T20:46:24.049Z
Reserved: 2023-05-30T00:00:00.000Z
Link: CVE-2023-34204
Updated: 2024-08-02T16:01:54.253Z
Status : Modified
Published: 2023-05-30T04:15:10.317
Modified: 2025-01-10T21:15:12.553
Link: CVE-2023-34204
OpenCVE Enrichment
No data.
EUVD