{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2018-25068","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-01-06T20:36:14.376Z","datePublished":"2023-01-06T20:37:32.556Z","dateUpdated":"2025-04-10T13:19:31.271Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T12:21:26.331Z"},"title":"devent globalpom-utils FileResourceManagerProvider.java createTmpDir temp file","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-377","lang":"en","description":"CWE-377 Insecure Temporary File"}]}],"affected":[{"vendor":"devent","product":"globalpom-utils","versions":[{"version":"4.0","status":"affected"},{"version":"4.1","status":"affected"},{"version":"4.2","status":"affected"},{"version":"4.3","status":"affected"},{"version":"4.4","status":"affected"},{"version":"4.5","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in devent globalpom-utils up to 4.5.0 and classified as critical. This vulnerability affects the function createTmpDir of the file globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpom/fileresourcemanager/FileResourceManagerProvider.java. The manipulation leads to insecure temporary file. The attack can be initiated remotely. Upgrading to version 4.5.1 is able to address this issue. The patch is identified as 77a820bac2f68e662ce261ecb050c643bd7ee560. It is recommended to upgrade the affected component. VDB-217570 is the identifier assigned to this vulnerability."},{"lang":"de","value":"In devent globalpom-utils bis 4.5.0 wurde eine kritische Schwachstelle gefunden. Es geht um die Funktion createTmpDir der Datei globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpom/fileresourcemanager/FileResourceManagerProvider.java. Dank Manipulation mit unbekannten Daten kann eine insecure temporary file-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Ein Aktualisieren auf die Version 4.5.1 vermag dieses Problem zu lösen. Der Patch wird als 77a820bac2f68e662ce261ecb050c643bd7ee560 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-01-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-01-06T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-01-06T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-01-29T13:53:53.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.217570","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.217570","tags":["signature","permissions-required"]},{"url":"https://github.com/devent/globalpom-utils/commit/77a820bac2f68e662ce261ecb050c643bd7ee560","tags":["patch"]},{"url":"https://github.com/devent/globalpom-utils/releases/tag/globalpomutils-4.5.1","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T12:26:39.635Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.217570","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.217570","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/devent/globalpom-utils/commit/77a820bac2f68e662ce261ecb050c643bd7ee560","tags":["patch","x_transferred"]},{"url":"https://github.com/devent/globalpom-utils/releases/tag/globalpomutils-4.5.1","tags":["patch","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-10T13:19:24.276217Z","id":"CVE-2018-25068","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-10T13:19:31.271Z"}}]}}