First published: Wed Feb 03 2021(Updated: )
In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from such files and list directories due to insecure permissions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kotlin | <1.4.21 | 1.4.21 |
JetBrains Kotlin | <1.4.21 | |
Oracle Communications Cloud Native Core Network Slice Selection Function | =1.2.1 | |
Oracle Communications Cloud Native Core Policy | =1.14.0 | |
Oracle Communications Cloud Native Core Service Communication Proxy | =1.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-29582 is a vulnerability in JetBrains Kotlin before version 1.4.21 that allows an attacker to read data from temporary files and list directories due to insecure permissions.
CVE-2020-29582 has a severity score of 5.3, which is considered medium.
To fix CVE-2020-29582, update JetBrains Kotlin to version 1.4.21 or higher.
You can find more information about CVE-2020-29582 at the following references: [CVE.org](https://www.cve.org/CVERecord?id=CVE-2020-29582), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-29582), [JetBrains Security Bulletin](https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1930291), [Red Hat Errata](https://access.redhat.com/errata/RHSA-2021:3205).
The Common Weakness Enumeration (CWE) for CVE-2020-29582 is CWE-276.