CVE-2020-15824

In JetBrains Kotlin from 1.4-M1 to 1.4-RC (as Kotlin 1.3.7x is not affected by the issue. Fixed version is 1.4.0) there is a script-cache privilege escalation vulnerability due to kotlin-main-kts cached scripts in the system temp directory, which is shared by all users by default.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jetbrains:kotlin:1.4.0:milestone1:*:*:*:*:*:*
cpe:2.3:a:jetbrains:kotlin:1.4.0:milestone2:*:*:*:*:*:*
cpe:2.3:a:jetbrains:kotlin:1.4.0:milestone3:*:*:*:*:*:*
cpe:2.3:a:jetbrains:kotlin:1.4.0:rc:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:banking_extensibility_workbench:14.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_extensibility_workbench:14.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_extensibility_workbench:14.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*

History

07 Nov 2023, 03:17

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465@%3Cnotifications.groovy.apache.org%3E', 'name': '[groovy-notifications] 20201207 [jira] [Closed] (GROOVY-9824) CVE-2020-17521 Apache Groovy Information Disclosure', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cannounce.apache.org%3E', 'name': '[announce] 20201205 [SECURITY] CVE-2020-17521: Apache Groovy Information Disclosure', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cusers.groovy.apache.org%3E', 'name': '[groovy-users] 20201205 [SECURITY] CVE-2020-17521: Apache Groovy Information Disclosure', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cdev.groovy.apache.org%3E', 'name': '[groovy-dev] 20201205 [SECURITY] CVE-2020-17521: Apache Groovy Information Disclosure', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967%40%3Cdev.groovy.apache.org%3E -
  • () https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967%40%3Cusers.groovy.apache.org%3E -
  • () https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465%40%3Cnotifications.groovy.apache.org%3E -
  • () https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967%40%3Cannounce.apache.org%3E -

03 Mar 2022, 17:45

Type Values Removed Values Added
CPE cpe:2.3:a:apache:groovy:4.0.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:apache:groovy:*:*:*:*:*:*:*:*

01 Mar 2022, 20:49

Type Values Removed Values Added
References (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html - (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory
References (MLIST) https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cdev.groovy.apache.org%3E - (MLIST) https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cdev.groovy.apache.org%3E - Mailing List, Third Party Advisory
References (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory
References (MLIST) https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cusers.groovy.apache.org%3E - (MLIST) https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cusers.groovy.apache.org%3E - Mailing List, Third Party Advisory
References (MLIST) https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465@%3Cnotifications.groovy.apache.org%3E - (MLIST) https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465@%3Cnotifications.groovy.apache.org%3E - Mailing List, Third Party Advisory
References (MLIST) https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cannounce.apache.org%3E - (MLIST) https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cannounce.apache.org%3E - Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2020/12/06/1 - (MLIST) http://www.openwall.com/lists/oss-security/2020/12/06/1 - Mailing List, Third Party Advisory
First Time Oracle
Apache
Apache groovy
Oracle banking Extensibility Workbench
Oracle communications Cloud Native Core Policy
CPE cpe:2.3:a:oracle:banking_extensibility_workbench:14.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:groovy:4.0.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_extensibility_workbench:14.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:groovy:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_extensibility_workbench:14.2:*:*:*:*:*:*:*

07 Feb 2022, 16:15

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpujan2022.html -

20 Oct 2021, 11:15

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html -

Information

Published : 2020-08-08 21:15

Updated : 2023-12-10 13:27


NVD link : CVE-2020-15824

Mitre link : CVE-2020-15824

CVE.ORG link : CVE-2020-15824


JSON object : View

Products Affected

oracle

  • banking_extensibility_workbench
  • communications_cloud_native_core_policy

jetbrains

  • kotlin
CWE
CWE-269

Improper Privilege Management