CVE-2013-2027
https://notcve.org/view.php?id=CVE-2013-2027
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors. Jython 2.2.1 utiliza el uses el desenmascar actual para configurar los privilegios de los ficheros del caché de clases, lo que permite a usuarios locales evadir las restricciones de acceso a través de vectores no especificados. • http://advisories.mageia.org/MGASA-2015-0096.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00055.html http://www.mandriva.com/security/advisories?name=MDVSA-2015:158 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html https://bugzilla.redhat.com/show_bug.cgi?id=947949 • CWE-264: Permissions, Privileges, and Access Controls •