CWE
200 379
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2020-17521: Infoleak

First published: Thu Nov 19 2020(Updated: )

A flaw was found in Apache Groovy. Groovy makes use of a method for creating temporary directories which is not suitable for security-sensitive contexts and allows for sensitive information leakage. The highest threat from this vulnerability is to data confidentiality.

Credit: security@apache.org security@apache.org

Affected SoftwareAffected VersionHow to fix
redhat/groovy<2.4.21
2.4.21
redhat/groovy<2.5.14
2.5.14
redhat/groovy<3.0.7
3.0.7
redhat/groovy 4.0.0-alpha<2
2
maven/org.codehaus.groovy:groovy-all>=3.0.0<3.0.7
3.0.7
maven/org.codehaus.groovy:groovy-all>=2.5.0<2.5.14
2.5.14
maven/org.codehaus.groovy:groovy-all>=2.0.0<2.4.21
2.4.21
maven/org.codehaus.groovy:groovy>=3.0.0<3.0.7
3.0.7
maven/org.codehaus.groovy:groovy>=2.5.0<2.5.14
2.5.14
maven/org.codehaus.groovy:groovy>=2.0.0<2.4.21
2.4.21
Apache Groovy>=2.0.0<=2.4.20
Apache Groovy>=2.5.0<=2.5.13
Apache Groovy>=3.0.0<=3.0.6
Apache Groovy=4.0.0-alpha1
Netapp Snapcenter
Oracle Agile Engineering Data Management=6.2.1.0
Oracle Agile PLM=9.3.3
Oracle Agile PLM=9.3.6
Oracle Agile Plm Mcad Connector=3.4
Oracle Agile Plm Mcad Connector=3.6
Oracle Business Process Management Suite=12.2.1.3.0
Oracle Business Process Management Suite=12.2.1.4.0
Oracle Communications Brm - Elastic Charging Engine=11.3.0.9.0
Oracle Communications Brm - Elastic Charging Engine=12.0.0.3
Oracle Communications Diameter Signaling Router=8.4.0.0
Oracle Communications Evolved Communications Application Server=7.1
Oracle Communications Services Gatekeeper=6.0
Oracle Communications Services Gatekeeper=6.1
Oracle Communications Services Gatekeeper=7.0
Oracle Healthcare Data Repository=7.0.2
Oracle Hospitality OPERA 5=5.6
Oracle iLearning=6.2
Oracle iLearning=6.3
Oracle Insurance Policy Administration>=11.0<=11.3.1
Oracle Jd Edwards Enterpriseone Orchestrator=9.2.6.0
Oracle Primavera Gateway>=17.12.0<=17.12.10
Oracle Primavera Unifier>=17.7<=17.12
Oracle Primavera Unifier=16.1
Oracle Primavera Unifier=16.2
Oracle Primavera Unifier=18.8
Oracle Primavera Unifier=19.12
Oracle Primavera Unifier=20.12
Oracle Retail Bulk Data Integration=15.0.3.0
Oracle Retail Bulk Data Integration=16.0.3.0
Oracle Retail Merchandising System=16.0.3
Oracle Retail Store Inventory Management=14.1.3.10
Oracle Retail Store Inventory Management=15.0.3.5
Oracle Retail Store Inventory Management=16.0.3.5
Apache Atlas=2.1.0

Remedy

Setting the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability for all operating systems and all Groovy versions. Users who cannot easily move to the fixed Groovy versions may wish to consider using the JDK’s Files#createTempDirectory method instead of the Groovy extension methods.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2020-17521?

    CVE-2020-17521 is a vulnerability found in Apache Groovy that allows an attacker to perform a directory traversal attack.

  • How severe is CVE-2020-17521?

    CVE-2020-17521 has a severity rating of 5.5 (medium).

  • Who is affected by CVE-2020-17521?

    The vulnerability affects users of Apache Groovy versions from 2.0.0 up to (but not including) 2.4.21, versions from 2.5.0 up to (but not including) 2.5.14, and versions from 3.0.0 up to (but not including) 3.0.7.

  • How can I fix CVE-2020-17521?

    To fix CVE-2020-17521, users should update Apache Groovy to version 2.4.21, 2.5.14, or 3.0.7.

  • Where can I find more information about CVE-2020-17521?

    More information about CVE-2020-17521 can be found on the Apache Groovy security page, as well as in the provided references.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203