GHSA-9347-9w64-q5wp

Suggest an improvement
Source
https://github.com/advisories/GHSA-9347-9w64-q5wp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-9347-9w64-q5wp/GHSA-9347-9w64-q5wp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-9347-9w64-q5wp
Aliases
Published
2022-05-14T02:05:10Z
Modified
2024-12-02T05:48:21.443750Z
Summary
Jython Improper Access Restrictions vulnerability
Details

Jython before 2.7.2b3 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.

Database specific
{
    "nvd_published_at": "2015-02-13T15:59:00Z",
    "cwe_ids": [
        "CWE-281"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-08-17T22:33:35Z"
}
References

Affected packages

Maven / org.python:jython-standalone

Package

Name
org.python:jython-standalone
View open source insights on deps.dev
Purl
pkg:maven/org.python/jython-standalone

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.2b3

Affected versions

2.*

2.5.1
2.5.2
2.5.3-rc1
2.5.3
2.5.4-rc1
2.7-b1
2.7-b2
2.7-b3
2.7-b4
2.7-rc1
2.7-rc2
2.7-rc3
2.7.0
2.7.1b1
2.7.1b2
2.7.1b3
2.7.1-rc2
2.7.1-rc3
2.7.1
2.7.2b2