CVE-2020-17521 Affecting groovy package, versions <2.4.21-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.36% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-GROOVY-1048700
  • published6 Dec 2020
  • disclosed7 Dec 2020

Introduced: 6 Dec 2020

CVE-2020-17521  (opens in a new tab)

How to fix?

Upgrade Debian:unstable groovy to version 2.4.21-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream groovy package and not the groovy package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2.

CVSS Base Scores

version 3.1