CVE-2013-2027: Jython Improper Access Restrictions vulnerability
(updated )
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
References
- advisories.mageia.org/MGASA-2015-0096.html
- lists.opensuse.org/opensuse-updates/2015-02/msg00055.html
- www.mandriva.com/security/advisories?name=MDVSA-2015:158
- www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- bugzilla.redhat.com/show_bug.cgi?id=947949
- github.com/advisories/GHSA-9347-9w64-q5wp
- github.com/jython/frozen-mirror/blob/b8d7aa4cee50c0c0fe2f4b235dd62922dd0f3f99/NEWS
- github.com/jython/frozen-mirror/commit/053949e66d307168fd70b39725f4d3e6b642acc1
- nvd.nist.gov/vuln/detail/CVE-2013-2027
Detect and mitigate CVE-2013-2027 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →