Wiz Agents & Workflows are here

CVE-2020-15250
Java vulnerability analysis and mitigation

Overview

The vulnerability CVE-2020-15250 affects JUnit4 versions from 4.7 to 4.13.1 and involves a local information disclosure vulnerability in the TemporaryFolder test rule. The issue was discovered and disclosed in October 2020, affecting Unix-like systems where the system's temporary directory is shared between all users (GitHub Advisory).

Technical details

The vulnerability exists in the TemporaryFolder test rule implementation where files and directories created in the system's temporary directory are readable by other users on the same system by default. This occurs because the temporary directory is shared between all users on Unix-like systems. The vulnerability specifically affects the file permissions of the root temporary folder, which prior to the fix had permissions set to 'drwxr-xr-x' allowing other users to read the contents (GitHub Advisory).

Impact

This is purely an information disclosure vulnerability that could expose sensitive information if JUnit tests write sensitive data like API keys or passwords into the temporary folder. The vulnerability only impacts environments where the tests execute in a system with other untrusted users, such as CI/CD environments. The vulnerability does not allow other users to overwrite the contents of these directories or files (GitHub Advisory).

Mitigation and workarounds

For Java 1.7 and higher users, the vulnerability is fixed in version 4.13.1. For Java 1.6 and lower users, no patch is available, but a workaround exists by specifying the 'java.io.tmpdir' system environment variable to a directory that is exclusively owned by the executing user. The fix for Java 1.7+ users changes the temporary folder permissions to 'drwx------' to restrict access (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-33871HIGH8.7
  • JavaJava
  • strimzi-kafka-operator-0.50
NoYesMar 27, 2026
CVE-2026-34214HIGH7.7
  • JavaJava
  • io.trino:trino-iceberg
NoYesMar 29, 2026
GHSA-443w-3rq3-5m5hHIGH7.7
  • JavaJava
  • software.amazon.awssdk:cloudfront
NoYesMar 27, 2026
CVE-2026-33870HIGH7.5
  • JavaJava
  • knative-kafka-broker-1.18
NoYesMar 27, 2026
CVE-2026-22744HIGH7.5
  • JavaJava
  • org.springframework.ai:spring-ai-redis-store
NoYesMar 27, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management