Lucene search

K
zdtCpnrodzc71337DAY-ID-23895
HistoryJul 18, 2015 - 12:00 a.m.

Apache Groovy 2.4.x Disclosure Vulnerabilities

2015-07-1800:00:00
cpnrodzc7
0day.today
31

0.021 Low

EPSS

Percentile

88.0%

Exploit for multiple platform in category remote exploits

*Severity*: Important

*Vendor*: The Apache Software Foundation

*Versions Affected*:

All unsupported versions ranging from 1.7.0 to 2.4.3.

*Impact*

Remote execution of untrusted code, DoS

Here you can find information about security patches or updates released for Apache Groovy. Note that unless specified otherwise, no binary or source patches are available. To obtain a security fix, you need to upgrade to the latest maintained version of Apache Groovy.

Releases prior to 2.4.4 were not released under Apache so no official patches for security updates are available for older versions.

    Groovy 2.4.x vulnerabilities
    Fixed in Groovy 2.4.4

    Important: CVE-2015-3253: Remote execution of untrusted code

    Description

    When an application has Groovy on the classpath and that it uses standard Java serialization mechanim to communicate between servers, or to store local data, it is possible for an attacker to bake a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability.

    Mitigation

    Apache Groovy 2.4.4 is the first and only supported release under the Apache Software Foundation. It is strongly recommended that all users using serialization upgrade to this version. If you cannot upgrade or rely on an older, unsupported version of Groovy, you can apply the following patch on the MethodClosure class (src/main/org/codehaus/groovy/runtime/MethodClosure.java):

     public class MethodClosure extends Closure {
    +    private Object readResolve() {
    +        throw new UnsupportedOperationException();
    +    }

    Alternatively, you should make sure to use a custom security policy file (using the standard Java security manager) or make sure that you do not rely on serialization to communicate remotely.


#  0day.today [2018-03-28]  #