First published: Thu Nov 19 2020(Updated: )
A flaw was found in Apache Groovy. Groovy makes use of a method for creating temporary directories which is not suitable for security-sensitive contexts and allows for sensitive information leakage. The highest threat from this vulnerability is to data confidentiality.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/groovy | <2.4.21 | 2.4.21 |
redhat/groovy | <2.5.14 | 2.5.14 |
redhat/groovy | <3.0.7 | 3.0.7 |
redhat/groovy 4.0.0-alpha | <2 | 2 |
maven/org.codehaus.groovy:groovy-all | >=3.0.0<3.0.7 | 3.0.7 |
maven/org.codehaus.groovy:groovy-all | >=2.5.0<2.5.14 | 2.5.14 |
maven/org.codehaus.groovy:groovy-all | >=2.0.0<2.4.21 | 2.4.21 |
maven/org.codehaus.groovy:groovy | >=3.0.0<3.0.7 | 3.0.7 |
maven/org.codehaus.groovy:groovy | >=2.5.0<2.5.14 | 2.5.14 |
maven/org.codehaus.groovy:groovy | >=2.0.0<2.4.21 | 2.4.21 |
Apache Groovy | >=2.0.0<=2.4.20 | |
Apache Groovy | >=2.5.0<=2.5.13 | |
Apache Groovy | >=3.0.0<=3.0.6 | |
Apache Groovy | =4.0.0-alpha1 | |
Netapp Snapcenter | ||
Oracle Agile Engineering Data Management | =6.2.1.0 | |
Oracle Agile PLM | =9.3.3 | |
Oracle Agile PLM | =9.3.6 | |
Oracle Agile Plm Mcad Connector | =3.4 | |
Oracle Agile Plm Mcad Connector | =3.6 | |
Oracle Business Process Management Suite | =12.2.1.3.0 | |
Oracle Business Process Management Suite | =12.2.1.4.0 | |
Oracle Communications Brm - Elastic Charging Engine | =11.3.0.9.0 | |
Oracle Communications Brm - Elastic Charging Engine | =12.0.0.3 | |
Oracle Communications Diameter Signaling Router | =8.4.0.0 | |
Oracle Communications Evolved Communications Application Server | =7.1 | |
Oracle Communications Services Gatekeeper | =6.0 | |
Oracle Communications Services Gatekeeper | =6.1 | |
Oracle Communications Services Gatekeeper | =7.0 | |
Oracle Healthcare Data Repository | =7.0.2 | |
Oracle Hospitality OPERA 5 | =5.6 | |
Oracle iLearning | =6.2 | |
Oracle iLearning | =6.3 | |
Oracle Insurance Policy Administration | >=11.0<=11.3.1 | |
Oracle Jd Edwards Enterpriseone Orchestrator | =9.2.6.0 | |
Oracle Primavera Gateway | >=17.12.0<=17.12.10 | |
Oracle Primavera Unifier | >=17.7<=17.12 | |
Oracle Primavera Unifier | =16.1 | |
Oracle Primavera Unifier | =16.2 | |
Oracle Primavera Unifier | =18.8 | |
Oracle Primavera Unifier | =19.12 | |
Oracle Primavera Unifier | =20.12 | |
Oracle Retail Bulk Data Integration | =15.0.3.0 | |
Oracle Retail Bulk Data Integration | =16.0.3.0 | |
Oracle Retail Merchandising System | =16.0.3 | |
Oracle Retail Store Inventory Management | =14.1.3.10 | |
Oracle Retail Store Inventory Management | =15.0.3.5 | |
Oracle Retail Store Inventory Management | =16.0.3.5 | |
Apache Atlas | =2.1.0 |
Setting the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability for all operating systems and all Groovy versions. Users who cannot easily move to the fixed Groovy versions may wish to consider using the JDK’s Files#createTempDirectory method instead of the Groovy extension methods.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-17521 is a vulnerability found in Apache Groovy that allows an attacker to perform a directory traversal attack.
CVE-2020-17521 has a severity rating of 5.5 (medium).
The vulnerability affects users of Apache Groovy versions from 2.0.0 up to (but not including) 2.4.21, versions from 2.5.0 up to (but not including) 2.5.14, and versions from 3.0.0 up to (but not including) 3.0.7.
To fix CVE-2020-17521, users should update Apache Groovy to version 2.4.21, 2.5.14, or 3.0.7.
More information about CVE-2020-17521 can be found on the Apache Groovy security page, as well as in the provided references.