
Cloud Vulnerability DB
A community-led vulnerabilities database
imapsync through version 2.229 contains a security vulnerability related to predictable file paths usage. The software uses predictable paths under /tmp and /var/tmp in its default mode of operation. Since both these directories are typically world-writable, this creates a security risk where an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it (NVD, GitHub Issue).
The vulnerability stems from the software's use of predictable file paths in world-writable directories (/tmp and /var/tmp). The issue affects multiple components including the PID file (imapsync.pid), imapsynccache directory, CGITMPDIRTOP, and CGIHASHFILE. The vulnerability has been assigned a CVSS v3.1 Base Score of 6.5 (MEDIUM) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N (NVD).
An attacker can exploit this vulnerability to modify imapsync's cache and overwrite files belonging to the user running the application. In a proof-of-concept demonstration, an attacker could create a symlink from /tmp/imapsync.pid to another file (such as /etc/passwd), causing imapsync to overwrite the target file when run with elevated privileges (GitHub Issue).
For Linux systems, enabling the fs.protected_symlinks sysctl option can provide some protection against symlink-based attacks. However, this does not address the fundamental security issue. The proper solution would involve using secure temporary file creation methods such as mkstemp() in C or File::Temp in Perl (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."