{"api_version":"1","generated_at":"2026-04-23T00:40:36+00:00","cve":"CVE-2023-2976","urls":{"html":"https://cve.report/CVE-2023-2976","api":"https://cve.report/api/cve/CVE-2023-2976.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-2976","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-2976"},"summary":{"title":"CVE-2023-2976","description":"Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.\n\nEven though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.","state":"PUBLIC","assigner":"security@google.com","published_at":"2023-06-14 18:15:00","updated_at":"2023-08-18 14:15:00"},"problem_types":["CWE-552"],"metrics":[],"references":[{"url":"https://github.com/google/guava/issues/2575","name":"https://github.com/google/guava/issues/2575","refsource":"MISC","tags":[],"title":"Security scan reported problem with com.google.common.io.FileBackedOutputStream · Issue #2575 · google/guava · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20230818-0008/","name":"https://security.netapp.com/advisory/ntap-20230818-0008/","refsource":"MISC","tags":[],"title":"CVE-2023-2976 Guava Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-2976","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2976","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"2976","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"google","cpe5":"guava","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-2976","qid":"150735","title":"Oracle WebLogic Server Multiple Vulnerabilities (CPU - OCT2023)"},{"cve":"CVE-2023-2976","qid":"20399","title":"Oracle Database 19c Critical OJVM Patch Update - January 2024"},{"cve":"CVE-2023-2976","qid":"20400","title":"Oracle Database 19c Critical Patch Update - January 2024"},{"cve":"CVE-2023-2976","qid":"20401","title":"Oracle Database 21c Critical Patch Update - January 2024"},{"cve":"CVE-2023-2976","qid":"242565","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 on RHEL 7 (RHSA-2023:7637)"},{"cve":"CVE-2023-2976","qid":"355869","title":"Amazon Linux Security Advisory for guava : ALAS2023-2023-305"},{"cve":"CVE-2023-2976","qid":"356787","title":"Amazon Linux Security Advisory for guava : ALAS2023-2023-458"},{"cve":"CVE-2023-2976","qid":"379516","title":"IBM Sterling Secure Proxy Multiple Vulnerabilities (7142038)"},{"cve":"CVE-2023-2976","qid":"731170","title":"Atlassian Confluence Data Center and Server Security Update (CONFSERVER-94510)"},{"cve":"CVE-2023-2976","qid":"754233","title":"SUSE Enterprise Linux Security Update for guava (SUSE-SU-2023:3090-1)"},{"cve":"CVE-2023-2976","qid":"87548","title":"Oracle WebLogic Server Multiple Vulnerabilities (CPUOCT2023)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-2976","ASSIGNER":"security@google.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.\n\nEven though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Creation of Temporary File With Insecure Permissions"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Google","product":{"product_data":[{"product_name":"Guava","version":{"version_data":[{"version_affected":"<","version_name":"1.0","version_value":"32.0.0"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/google/guava/issues/2575","refsource":"MISC","name":"https://github.com/google/guava/issues/2575"},{"url":"https://security.netapp.com/advisory/ntap-20230818-0008/","refsource":"MISC","name":"https://security.netapp.com/advisory/ntap-20230818-0008/"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-06-14 18:15:00","lastModifiedDate":"2023-08-18 14:15:00","problem_types":["CWE-552"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.1,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:google:guava:*:*:*:*:*:*:*:*","versionEndExcluding":"32.0.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}