Versio.io

CVE-2020-27216

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 23-10-2020 03:15
Last modified: - 01-03-2022 09:35
Total changes: - 53

Description

In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
High
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
7.0
Base score
1.0
5.9
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=eclipse AND product=jetty AND versionStartIncluding=1.0 AND versionEndExcluding=9.3.29
vendor=eclipse AND product=jetty AND versionEndIncluding=9.4.32 AND versionStartIncluding=9.4.0
vendor=eclipse AND product=jetty AND version=10.0.0 AND update=alpha1
vendor=eclipse AND product=jetty AND version=10.0.0 AND update=beta0
vendor=eclipse AND product=jetty AND version=10.0.0 AND update=beta1
vendor=eclipse AND product=jetty AND version=10.0.0 AND update=beta2
vendor=eclipse AND product=jetty AND version=11.0.0 AND update=alpha1
vendor=eclipse AND product=jetty AND version=11.0.0 AND update=beta1
vendor=eclipse AND product=jetty AND version=11.0.0 AND update=beta2
OR
vendor=netapp AND product=snap_creator_framework AND version=-
vendor=netapp AND product=snapcenter AND version=-
vendor=netapp AND product=vasa_provider AND target_software=clustered_data_ontap AND versionStartIncluding=7.2
vendor=netapp AND product=virtual_storage_console AND target_software=vmware_vsphere AND versionStartIncluding=7.2
AND
OR
vendor=netapp AND product=storage_replication_adapter AND target_software=clustered_data_ontap AND versionStartIncluding=7.2
OR
vendor=vmware AND product=vsphere AND version=-
OR
vendor=oracle AND product=communications_application_session_controller AND version=3.9m0p2
vendor=oracle AND product=communications_converged_application_server_-_service_controller AND version=6.2
vendor=oracle AND product=communications_element_manager AND versionEndIncluding=8.2.2.1 AND versionStartIncluding=8.2.1
vendor=oracle AND product=communications_offline_mediation_controller AND version=12.0.0.3.0
vendor=oracle AND product=communications_pricing_design_center AND version=12.0.0.3.0
vendor=oracle AND product=communications_services_gatekeeper AND version=7.0
vendor=oracle AND product=flexcube_core_banking AND versionEndIncluding=11.9.0 AND versionStartIncluding=11.5.0
vendor=oracle AND product=flexcube_private_banking AND version=12.0.0
vendor=oracle AND product=flexcube_private_banking AND version=12.1.0
vendor=oracle AND product=jd_edwards_enterpriseone_tools AND versionEndExcluding=9.2.6.0
vendor=oracle AND product=siebel_core_-_automation AND versionEndIncluding=21.5
OR
vendor=apache AND product=beam AND version=2.21.0
vendor=apache AND product=beam AND version=2.22.0
vendor=apache AND product=beam AND version=2.23.0
vendor=apache AND product=beam AND version=2.24.0
vendor=apache AND product=beam AND version=2.25.0
OR
vendor=Debian AND product=debian_linux AND version=9.0
vendor=Debian AND product=debian_linux AND version=10.0
 

Reference

 


Keywords

NVD

 

CVE-2020-27216

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.