Debian Jython vulnerabilities

17 known vulnerabilities affecting debian/jython.

Total CVEs
17
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH1MEDIUM7LOW8

Vulnerabilities

Page 1 of 1
CVE-2026-4519HIGHCVSS 7.0fixed in python3.14 3.14.4-1 (sid)2026
CVE-2026-4519 [HIGH] CVE-2026-4519: jython - The webbrowser.open() API would accept leading dashes in the URL which could be... The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended to sanitize URLs prior to passing to webbrowser.open(). Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2026-0865MEDIUMCVSS 5.9fixed in python3.13 3.13.12-1 (forky)2026
CVE-2026-0865 [MEDIUM] CVE-2026-0865: jython - User-controlled header names and values containing newlines can allow injecting ... User-controlled header names and values containing newlines can allow injecting HTTP headers. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-15366MEDIUMCVSS 5.9fixed in python3.9 3.9.2-1+deb11u5 (bullseye)2025
CVE-2025-15366 [MEDIUM] CVE-2025-15366: jython - The imaplib module, when passed a user-controlled command, can have additional c... The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-12084MEDIUMCVSS 6.3fixed in python3.13 3.13.11-1 (forky)2025
CVE-2025-12084 [MEDIUM] CVE-2025-12084: jython - When building nested elements using xml.dom.minidom methods such as appendChild(... When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-6069MEDIUMCVSS 4.3fixed in pypy3 7.3.5+dfsg-2+deb11u5 (bullseye)2025
CVE-2025-6069 [MEDIUM] CVE-2025-6069: jython - The html.parser.HTMLParser class had worse-case quadratic complexity when proces... The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-15367MEDIUMCVSS 5.9fixed in python3.9 3.9.2-1+deb11u5 (bullseye)2025
CVE-2025-15367 [MEDIUM] CVE-2025-15367: jython - The poplib module, when passed a user-controlled command, can have additional co... The poplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-8291MEDIUMCVSS 4.3fixed in pypy3 7.3.5+dfsg-2+deb11u5 (bullseye)2025
CVE-2025-8291 [MEDIUM] CVE-2025-8291: jython - The 'zipfile' module would not check the validity of the ZIP64 End of Central Di... The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compa
debian
CVE-2025-11468LOWCVSS 5.7fixed in python3.13 3.13.12-1 (forky)2025
CVE-2025-11468 [MEDIUM] CVE-2025-11468: jython - When folding a long comment in an email header containing exclusively unfoldable... When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2025-4330LOWCVSS 7.5fixed in pypy3 7.3.20+dfsg-2 (forky)2025
CVE-2025-4330 [HIGH] CVE-2025-4330: jython - Allows the extraction filter to be ignored, allowing symlink targets to point ou... Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See
debian
CVE-2025-4435LOWCVSS 7.5fixed in pypy3 7.3.20+dfsg-2 (forky)2025
CVE-2025-4435 [HIGH] CVE-2025-4435: jython - When using a TarFile.errorlevel = 0 and extracting with a filter the documented ... When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved
debian
CVE-2025-4138LOWCVSS 7.5fixed in pypy3 7.3.20+dfsg-2 (forky)2025
CVE-2025-4138 [HIGH] CVE-2025-4138: jython - Allows the extraction filter to be ignored, allowing symlink targets to point ou... Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See
debian
CVE-2025-4517LOWCVSS 9.4fixed in pypy3 7.3.20+dfsg-2 (forky)2025
CVE-2025-4517 [CRITICAL] CVE-2025-4517: jython - Allows arbitrary filesystem writes outside the extraction directory during extra... Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation ht
debian
CVE-2024-12718LOWCVSS 5.3fixed in pypy3 7.3.20+dfsg-2 (forky)2024
CVE-2024-12718 [MEDIUM] CVE-2024-12718: jython - Allows modifying some file metadata (e.g. last modified) with filter="data" or f... Allows modifying some file metadata (e.g. last modified) with filter="data" or file permissions (chmod) with filter="tar" of files outside the extraction directory. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or
debian
CVE-2019-16935MEDIUMCVSS 6.1fixed in jython 2.7.2+repack1-5 (bookworm)2019
CVE-2019-16935 [MEDIUM] CVE-2019-16935: jython - The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, an... The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this
debian
CVE-2017-17522LOWCVSS 8.82017
CVE-2017-17522 [HIGH] CVE-2017-17522: jython - Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launc... Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default she
debian
CVE-2016-4000CRITICALCVSS 9.8fixed in jython 2.5.3-17 (bookworm)2016
CVE-2016-4000 [CRITICAL] CVE-2016-4000: jython - Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted ... Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object. Scope: local bookworm: resolved (fixed in 2.5.3-17) bullseye: resolved (fixed in 2.5.3-17) forky: resolved (fixed in 2.5.3-17) sid: resolved (fixed in 2.5.3-17) trixie: resolved (fixed in 2.5.3-17)
debian
CVE-2013-2027LOWCVSS 4.6fixed in jython 2.7.1+repack-1 (bookworm)2013
CVE-2013-2027 [MEDIUM] CVE-2013-2027: jython - Jython 2.2.1 uses the current umask to set the privileges of the class cache fil... Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors. Scope: local bookworm: resolved (fixed in 2.7.1+repack-1) bullseye: resolved (fixed in 2.7.1+repack-1) forky: resolved (fixed in 2.7.1+repack-1) sid: resolved (fixed in 2.7.1+repack-1) trixie: res
debian