CVE-2021-21290 (CNNVD-202102-612)
中文标题:
Netty 安全漏洞
英文标题:
Local Information Disclosure Vulnerability in Netty on Unix-Like systems due temporary files
漏洞描述
中文描述:
Netty是Netty社区的一款非阻塞I/O客户端-服务器框架,它主要用于开发Java网络应用程序,如协议服务器和客户端等。 Netty 4.1.59之前版本存在安全漏洞,该漏洞源于当netty的多部分解码器被使用时,如果磁盘上的临时存储被启用,则本地信息可以通过本地系统临时目录进行公开。在类unix系统中,所有用户共享临时目录。因此,使用没有显式设置文件/目录权限的api写入该目录可能导致信息泄露。值得注意的是,这并不影响现代的MacOS操作系统。法”文件。createTempFile"在类unix系统上创建一个随机文件,但默认情况下将创建这个文件,权限为"-rw-r——r——"。因此,如果将敏感信息写入该文件,其他本地用户就可以读取该信息。
英文描述:
Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involving an insecure temp file. When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method "File.createTempFile" on unix-like systems creates a random file, but, by default will create this file with the permissions "-rw-r--r--". Thus, if sensitive information is written to this file, other local users can read this information. This is the case in netty's "AbstractDiskHttpData" is vulnerable. This has been fixed in version 4.1.59.Final. As a workaround, one may specify your own "java.io.tmpdir" when you start the JVM or use "DefaultHttpDataFactory.setBaseDir(...)" to set the directory to something that is only readable by the current user.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| netty | netty | < 4.1.59.Final | - | - |
cpe:2.3:a:netty:netty:<_4.1.59.final:*:*:*:*:*:*:*
|
| netty | netty | * | - | - |
cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 10.0 | - | - |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
| quarkus | quarkus | * | - | - |
cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*
|
| oracle | banking_corporate_lending_process_management | 14.2.0 | - | - |
cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2.0:*:*:*:*:*:*:*
|
| oracle | banking_corporate_lending_process_management | 14.3.0 | - | - |
cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*
|
| oracle | banking_corporate_lending_process_management | 14.5.0 | - | - |
cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0:*:*:*:*:*:*:*
|
| oracle | banking_credit_facilities_process_management | 14.2.0 | - | - |
cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2.0:*:*:*:*:*:*:*
|
| oracle | banking_credit_facilities_process_management | 14.3.0 | - | - |
cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*
|
| oracle | banking_credit_facilities_process_management | 14.5.0 | - | - |
cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0:*:*:*:*:*:*:*
|
| oracle | banking_trade_finance_process_management | 14.2.0 | - | - |
cpe:2.3:a:oracle:banking_trade_finance_process_management:14.2.0:*:*:*:*:*:*:*
|
| oracle | banking_trade_finance_process_management | 14.3.0 | - | - |
cpe:2.3:a:oracle:banking_trade_finance_process_management:14.3.0:*:*:*:*:*:*:*
|
| oracle | banking_trade_finance_process_management | 14.5.0 | - | - |
cpe:2.3:a:oracle:banking_trade_finance_process_management:14.5.0:*:*:*:*:*:*:*
|
| oracle | communications_brm_-_elastic_charging_engine | 12.0.0.3 | - | - |
cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.3:*:*:*:*:*:*:*
|
| oracle | communications_design_studio | 7.4.2 | - | - |
cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*
|
| oracle | communications_messaging_server | 8.1 | - | - |
cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*
|
| oracle | nosql_database | * | - | - |
cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*
|
| netapp | active_iq_unified_manager | - | - | - |
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
|
| netapp | cloud_secure_agent | - | - | - |
cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
|
| netapp | snapcenter | - | - | - |
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2021-21290 |
2025-11-11 15:20:47 | 2025-11-11 07:36:37 |
| NVD | nvd_CVE-2021-21290 |
2025-11-11 14:57:33 | 2025-11-11 07:44:58 |
| CNNVD | cnnvd_CNNVD-202102-612 |
2025-11-11 15:10:35 | 2025-11-11 07:56:38 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202102-612
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 21
- data_sources: ['cve'] -> ['cve', 'nvd']