First published: Sat Jan 14 2017(Updated: )
It was found that a flaw in Apache groovy library allows remote code execution wherever deserialization occurs in the application. It is possible for an attacker to craft a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/groovy | <0:1.8.9-8.el7_4 | 0:1.8.9-8.el7_4 |
redhat/rh-maven33-groovy | <0:1.8.9-7.19.el6 | 0:1.8.9-7.19.el6 |
redhat/rh-maven33-groovy | <0:1.8.9-7.19.el7 | 0:1.8.9-7.19.el7 |
redhat/groovy | <2.4.8 | 2.4.8 |
maven/org.codehaus.groovy:groovy-all | >=1.7.0<=2.4.7 | 2.4.8 |
maven/org.codehaus.groovy:groovy | >=1.7.0<=2.4.7 | 2.4.8 |
Apache Groovy | >=1.7.0<=2.4.3 | |
Apache Groovy | >=2.4.4<=2.4.7 | |
Red Hat Enterprise Linux Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)