imapsync through 2.229 uses predictable paths under /tmp...
Moderate severity
Unreviewed
Published
May 30, 2023
to the GitHub Advisory Database
•
Updated Apr 4, 2024
Description
Published by the National Vulnerability Database
May 30, 2023
Published to the GitHub Advisory Database
May 30, 2023
Last updated
Apr 4, 2024
imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it.
References