In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Apache
Subscribe
|
Beam
Subscribe
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Eclipse
Subscribe
|
Jetty
Subscribe
|
|
Netapp
Subscribe
|
|
|
Oracle
Subscribe
|
Communications Application Session Controller
Subscribe
Communications Converged Application Server - Service Controller
Subscribe
Communications Element Manager
Subscribe
Communications Offline Mediation Controller
Subscribe
Communications Pricing Design Center
Subscribe
Communications Services Gatekeeper
Subscribe
Flexcube Core Banking
Subscribe
Flexcube Private Banking
Subscribe
Jd Edwards Enterpriseone Tools
Subscribe
Siebel Core - Automation
Subscribe
|
|
Redhat
Subscribe
|
|
|
Vmware
Subscribe
|
Vsphere
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2661-1 | jetty9 security update |
Debian DSA |
DSA-4949-1 | jetty9 security update |
EUVD |
EUVD-2020-1455 | In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability. |
Github GHSA |
GHSA-g3wg-6mcf-8jj6 | Local Temp Directory Hijacking Vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2024-08-04T16:11:36.150Z
Reserved: 2020-10-19T00:00:00
Link: CVE-2020-27216
No data.
Status : Modified
Published: 2020-10-23T13:15:16.283
Modified: 2024-11-21T05:20:52.263
Link: CVE-2020-27216
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Github GHSA