Description
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3281 | Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors. |
Github GHSA |
GHSA-9347-9w64-q5wp | Jython Improper Access Restrictions vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T15:20:37.461Z
Reserved: 2013-02-19T00:00:00.000Z
Link: CVE-2013-2027
No data.
Status : Modified
Published: 2015-02-13T15:59:00.067
Modified: 2026-05-06T22:30:45.220
Link: CVE-2013-2027
OpenCVE Enrichment
No data.
EUVD
Github GHSA