jython: code execution
Package(s): | jython | CVE #(s): | CVE-2013-2027 | ||||||||||||
Created: | February 12, 2015 | Updated: | March 30, 2015 | ||||||||||||
Description: | From the SUSE bugzilla entry:
There are [several] problems with the way Jython creates class cache files, potentially leading to arbitrary code execution or information disclosure. # (umask 000; jython -c 'import xmllib') # ls -l '/usr/share/jython/Lib/xmllib$py.class' -rw-rw-rw-. 1 root root 52874 Apr 3 17:24 /usr/share/jython/Lib/xmllib$py.classJython does not explicitly set permissions of the class files; therefore with weak umask it creates world-writable files, or discloses sensitive data that would be in a non-world-readable package file. Also, the package writes to /usr/share, which it shouldn't; /var/cache would be more appropriate, but would still lead to a possibility of a content disclosure. The only really portable and secure way to cache class files would be a directory in user's home with 0700 permissions. | ||||||||||||||
Alerts: |
|