org.grails:grails-core@2.0.1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.grails:grails-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Man-in-the-Middle (MitM)

org.grails:grails-core is a framework used to build web applications with the Groovy programming language. The core framework is very extensible and there are numerous plugins available that provide easy integration of add-on features.

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). Cleartext HTTP protocol is used within specific versions of Grails core to resolve the SDKMan notification service. It should be noted that dependencies were not resolved or fetched over cleartext HTTP. As such, success exploitation of this vulnerability is low.

How to fix Man-in-the-Middle (MitM)?

Upgrade org.grails:grails-core to version 3.3.10 or higher.

[,3.3.10)
  • M
Information Exposure

org.grails:grails-core is a framework used to build web applications with the Groovy programming language. The core framework is very extensible and there are numerous plugins available that provide easy integration of add-on features.

Affected versions of this package are vulnerable to Information Exposure. The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 before 2.3.6 does not properly restrict access to files in the WEB-INF directory, which allows remote attackers to obtain sensitive information via a direct request.

NOTE: this identifier has been SPLIT due to different researchers and different vulnerability types. See CVE-2014-2857 for the META-INF variant and CVE-2014-2858 for the directory traversal.

How to fix Information Exposure?

Upgrade org.grails:grails-core to version 2.3.6 or higher.

[2,2.3.6)
  • M
Access Restriction Bypass

org.grails:grails-core is a framework used to build web applications with the Groovy programming language. The core framework is very extensible and there are numerous plugins available that provide easy integration of add-on features.

Affected versions of this package are vulnerable to Access Restriction Bypass. VMware SpringSource Grails does not properly restrict data binding, which might allow remote attackers to bypass intended access restrictions and modify arbitrary object properties via a crafted request parameter to an application.

How to fix Access Restriction Bypass?

Upgrade org.grails:grails-core to version 1.3.8, 2.0.2 or higher.

[,1.3.8) [2,2.0.2)