Lucene search

K
cve[email protected]CVE-2013-2027
HistoryFeb 13, 2015 - 3:59 p.m.

CVE-2013-2027

2015-02-1315:59:00
CWE-264
web.nvd.nist.gov
43
jython
privilege bypass
umask
cve-2013-2027
nvd

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

8.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.

Affected configurations

NVD
Node
opensuseopensuseMatch13.1
OR
opensuseopensuseMatch13.2
Node
jython_projectjythonMatch2.2.1

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

8.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%