Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3281 | Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors. |
Github GHSA |
GHSA-9347-9w64-q5wp | Jython Improper Access Restrictions vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T15:20:37.461Z
Reserved: 2013-02-19T00:00:00.000Z
Link: CVE-2013-2027
No data.
Status : Deferred
Published: 2015-02-13T15:59:00.067
Modified: 2025-04-12T10:46:40.837
Link: CVE-2013-2027
OpenCVE Enrichment
No data.
EUVD
Github GHSA