org.grails:grails-core@2.3.5 vulnerabilities

  • latest version

    6.2.3

  • latest non vulnerable version

  • first published

    16 years ago

  • latest version published

    5 months ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.grails:grails-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Man-in-the-Middle (MitM)

    org.grails:grails-core is a framework used to build web applications with the Groovy programming language. The core framework is very extensible and there are numerous plugins available that provide easy integration of add-on features.

    Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). Cleartext HTTP protocol is used within specific versions of Grails core to resolve the SDKMan notification service. It should be noted that dependencies were not resolved or fetched over cleartext HTTP. As such, success exploitation of this vulnerability is low.

    How to fix Man-in-the-Middle (MitM)?

    Upgrade org.grails:grails-core to version 3.3.10 or higher.

    [,3.3.10)
    • M
    Information Exposure

    org.grails:grails-core is a framework used to build web applications with the Groovy programming language. The core framework is very extensible and there are numerous plugins available that provide easy integration of add-on features.

    Affected versions of this package are vulnerable to Information Exposure. The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 before 2.3.6 does not properly restrict access to files in the WEB-INF directory, which allows remote attackers to obtain sensitive information via a direct request.

    NOTE: this identifier has been SPLIT due to different researchers and different vulnerability types. See CVE-2014-2857 for the META-INF variant and CVE-2014-2858 for the directory traversal.

    How to fix Information Exposure?

    Upgrade org.grails:grails-core to version 2.3.6 or higher.

    [2,2.3.6)