It was found that the jclouds scriptbuilder Statements class wrote a temporary file to a predictable location. An attacker could use this flaw to access sensitive data, cause a denial of service, or perform other attacks.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://seclists.org/oss-sec/2014/q2/579 | mailing list exploit third party advisory |
https://issues.apache.org/jira/browse/JCLOUDS-612 | issue tracking patch vendor advisory |