{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T05:25:19.238","vulnerabilities":[{"cve":{"id":"CVE-2021-23331","sourceIdentifier":"report@snyk.io","published":"2021-02-03T18:15:16.430","lastModified":"2024-11-21T05:51:31.167","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"This affects all versions of package com.squareup:connect. The method prepareDownloadFilecreates creates a temporary file with the permissions bits of -rw-r--r-- on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded by downloadFileFromResponse will be visible to all other users on the local system. A workaround fix for this issue is to set the system property java.io.tmpdir to a safe directory as remediation. Note: This version of the SDK is end of life and no longer maintained, please upgrade to the latest version."},{"lang":"es","value":"Esto afecta a todas las versiones del paquete com.squareup:connect.&#xa0;El método prepareDownloadFilecreates crea un archivo temporal con los bits de permisos de -rw-r--r-- en sistemas tipo Unix.&#xa0;En sistemas tipo Unix, el directorio temporal del sistema se comparte entre usuarios.&#xa0;Como tal, el contenido del archivo descargado por downloadFileFromResponse será visible para todos los demás usuarios en el sistema local.&#xa0;Una solución alternativa para este problema es establecer la propiedad del sistema java.io.tmpdir en un directorio seguro como remediación.&#xa0;Nota: Esta versión del SDK está al final de su vida útil y ya no se mantiene; por favor actualizar a la última versión"}],"metrics":{"cvssMetricV31":[{"source":"report@snyk.io","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":4.4,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:squareup:connect_java_software_development_kit:*:*:*:*:*:*:*:*","matchCriteriaId":"ECBAE5DB-BB7E-4FCA-BEAF-F9F4EA32E42F"}]}]}],"references":[{"url":"https://github.com/square/connect-java-sdk/blob/master/src/main/java/com/squareup/connect/ApiClient.java%23L613","source":"report@snyk.io","tags":["Broken Link"]},{"url":"https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUP-1065988","source":"report@snyk.io","tags":["Third Party Advisory"]},{"url":"https://github.com/square/connect-java-sdk/blob/master/src/main/java/com/squareup/connect/ApiClient.java%23L613","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUP-1065988","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}