org.codehaus.groovy:groovy@2.4.0-beta-2 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.codehaus.groovy:groovy package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Deserialization of Untrusted Data

org.codehaus.groovy:groovy is an object-oriented programming language for the Java platform.

Affected versions of the package are vulnerable to Deserialization of Untrusted Data via the MethodClosure class. A malicious user may craft a special serialized object that will execute code directly when deserialized. This can also cause a Denial of Service (DoS).

How to fix Deserialization of Untrusted Data?

Upgrade org.codehaus.groovy:groovy to version 2.4.7 or higher.

[,2.4.7)
  • C
Deserialization of Untrusted Data

Affected versions of org.codehaus.groovy:groovy-all are vulnerable to Deserialization of Untrusted Data. The MethodClosure class allows remote attackers to execute arbitrary code or cause a denial of service via a crafted serialized object.

How to fix Deserialization of Untrusted Data?

Upgrade org.codehaus.groovy:groovy to version 2.4.4 or higher.

[1.7.0,2.4.4)
  • H
Information Disclosure

org.codehaus.groovy:groovy is a language for the JVM

Affected versions of this package are vulnerable to Information Disclosure. Groovy may create temporary directories within the OS temporary directory which is shared between all users on affected systems. This vulnerability only impacts Unix-like systems, and very old versions of Mac OSX and Windows.

How to fix Information Disclosure?

Upgrade org.codehaus.groovy:groovy to version 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2 or higher.

[,2.4.21) [2.5.0,2.5.14) [3.0.0,3.0.7) [4.0.0-alpha-1,4.0.0-alpha-2)