Unknown
CVE-2020-27216
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2020-27216
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system’s temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- apache,
- debian,
- eclipse,
- netapp,
- oracle
Products
- beam 2.21.0,
- beam 2.22.0,
- beam 2.23.0,
- beam 2.24.0,
- beam 2.25.0,
- communications application session controller 3.9m0p2,
- communications converged application server - service controller 6.2,
- communications element manager,
- communications offline mediation controller 12.0.0.3.0,
- communications pricing design center 12.0.0.3.0,
- communications services gatekeeper 7.0,
- debian linux 10.0,
- debian linux 9.0,
- flexcube core banking,
- flexcube private banking 12.0.0,
- flexcube private banking 12.1.0,
- jd edwards enterpriseone tools,
- jetty,
- jetty 10.0.0,
- jetty 11.0.0,
- siebel core - automation,
- snap creator framework -,
- snapcenter -,
- storage replication adapter,
- vasa provider,
- virtual storage console
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: