Lucene search

K
cveRedhatCVE-2013-2027
HistoryFeb 13, 2015 - 3:59 p.m.

CVE-2013-2027

2015-02-1315:59:00
CWE-264
redhat
web.nvd.nist.gov
49
jython
privilege bypass
umask
cve-2013-2027
nvd

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

AI Score

8.5

Confidence

High

EPSS

0

Percentile

5.1%

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.

Affected configurations

Nvd
Node
opensuseopensuseMatch13.1
OR
opensuseopensuseMatch13.2
Node
jython_projectjythonMatch2.2.1
VendorProductVersionCPE
opensuseopensuse13.1cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
opensuseopensuse13.2cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
jython_projectjython2.2.1cpe:2.3:a:jython_project:jython:2.2.1:*:*:*:*:*:*:*

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

AI Score

8.5

Confidence

High

EPSS

0

Percentile

5.1%