Vulnerability Details : CVE-2022-24823
Potential exploit
Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.
Vulnerability category: Information leak
Products affected by CVE-2022-24823
- cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
- cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
- cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-24823
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 20 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-24823
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:P/I:N/A:N |
3.4
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2022-24823
-
Opening temporary files without appropriate measures or controls can leave the file, its contents and any function that it impacts vulnerable to attack.Assigned by: security-advisories@github.com (Primary)
-
The product creates a temporary file in a directory whose permissions allow unintended actors to determine the file's existence or otherwise access that file.Assigned by: security-advisories@github.com (Primary)
-
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.Assigned by:
- nvd@nist.gov (Secondary)
- security-advisories@github.com (Primary)
References for CVE-2022-24823
-
https://security.netapp.com/advisory/ntap-20220616-0004/
CVE-2022-24823 Apache Netty Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1
Merge pull request from GHSA-269q-hmxg-m83q · netty/netty@185f8b2 · GitHubPatch;Third Party Advisory
-
https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2
Local Information Disclosure Vulnerability in Netty on Unix-Like systems due temporary files · Advisory · netty/netty · GitHubExploit;Mitigation;Third Party Advisory
-
https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q
Local Information Disclosure Vulnerability in Netty on Unix-Like systems due temporary files for Java 6 and lower in io.netty:netty-codec-http · Advisory · netty/netty · GitHubExploit;Mitigation;Third Party Advisory
-
https://www.oracle.com/security-alerts/cpujul2022.html
Oracle Critical Patch Update Advisory - July 2022Patch;Third Party Advisory
Jump to