Search for vulnerabilities
Vulnerability details: VCID-7fcf-99zp-aaab
Vulnerability ID VCID-7fcf-99zp-aaab
Aliases CVE-2013-2027
GHSA-9347-9w64-q5wp
Summary Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
Status Published
Exploitability 0.5
Weighted Severity 7.0
Risk 3.5
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
generic_textual MODERATE http://advisories.mageia.org/MGASA-2015-0096.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-updates/2015-02/msg00055.html
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-2027.html
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2013-2027
generic_textual MODERATE https://bugzilla.redhat.com/show_bug.cgi?id=947949
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2027
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-9347-9w64-q5wp
generic_textual MODERATE https://github.com/jython/frozen-mirror/blob/b8d7aa4cee50c0c0fe2f4b235dd62922dd0f3f99/NEWS#L25C8-L25C15
generic_textual MODERATE https://github.com/jython/frozen-mirror/commit/053949e66d307168fd70b39725f4d3e6b642acc1
cvssv2 4.6 https://nvd.nist.gov/vuln/detail/CVE-2013-2027
generic_textual MODERATE http://www.mandriva.com/security/advisories?name=MDVSA-2015:158
cvssv3.1 9.8 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
generic_textual CRITICAL http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
Reference id Reference type URL
http://advisories.mageia.org/MGASA-2015-0096.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00055.html
http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-2027.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2027.json
https://api.first.org/data/v1/epss?cve=CVE-2013-2027
https://bugzilla.redhat.com/show_bug.cgi?id=947949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2027
https://github.com/jython/frozen-mirror/blob/b8d7aa4cee50c0c0fe2f4b235dd62922dd0f3f99/NEWS#L25C8-L25C15
https://github.com/jython/frozen-mirror/commit/053949e66d307168fd70b39725f4d3e6b642acc1
http://www.mandriva.com/security/advisories?name=MDVSA-2015:158
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
777079 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777079
cpe:2.3:a:jython_project:jython:2.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jython_project:jython:2.2.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
CVE-2013-2027 https://nvd.nist.gov/vuln/detail/CVE-2013-2027
GHSA-9347-9w64-q5wp https://github.com/advisories/GHSA-9347-9w64-q5wp
No exploits are available.
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2013-2027
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.0403
EPSS Score 0.00025
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.