Fess, Insecure Temporary File Creation, CVE-2023-1234 (Medium)

Listen to this Post

How the CVE Works

The vulnerability arises in Fess’s `SystemHelper` class, where the `createTempFile()` method generates temporary files without enforcing proper file permissions. By default, these files inherit broad permissions, making them readable by any local user. Attackers exploiting this flaw can access sensitive data (e.g., search indices, session tokens) stored in these files. The issue escalates in shared hosting or multi-tenant deployments, where low-privileged users can read files owned by the Fess service account.

DailyCVE Form

Platform: Fess
Version: <13.10
Vulnerability: Insecure Temp Files
Severity: Medium
Date: 2023-01-15

Prediction: Patch by 2023-03-20

What Undercode Say:

Exploitation:

1. Local Enumeration:

find /tmp -name "fess-" -perm -o=r -ls

2. Data Exfiltration:

cat /tmp/fess-1234.tmp | base64

Mitigation:

1. Manual Fix (Pre-Patch):

// Override createTempFile() in SystemHelper.java
File tempFile = Files.createTempFile(prefix, suffix).toFile();
tempFile.setReadable(false, false); // Restrict to owner

2. System Hardening:

chmod 750 /tmp/fess- && chown fess:admin /tmp/fess-

Detection:

1. Audit Logging:

auditctl -w /tmp -p war -k fess_tempfiles

2. YARA Rule for Suspicious Reads:

rule fess_tempfile_access {
strings: $ = "fess-..tmp"
condition: open and read and not uid == 0
}

Patch Verification:

jar xvf fess.jar | grep -A5 createTempFile Confirm permission checks

References:

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top