CVE-2020-17521 - log back

CVE-2020-17521 edited at 06 Dec 2020 09:53:15
Severity
- Unknown
+ High
Remote
- Unknown
+ Local
Type
- Unknown
+ Privilege escalation
Description
+ Groovy before version 2.5.14 may create temporary directories within the OS temporary directory which is shared between all users on affected systems. Groovy will create such directories for internal use when producing Java Stubs or on behalf of user code via two extension methods for creating temporary directories. If Groovy user code uses either of these extension methods, and stores executable code in the resulting temporary directory, this can lead to local privilege escalation. If such Groovy code is making use of the temporary directory to store sensitive information, such information could be exposed or modified.
References
+ https://issues.apache.org/jira/browse/GROOVY-9824
+ https://github.com/apache/groovy/commit/98dc5d713926cd81b006c510a1546ccd520fe17f
Notes
+ Workaround
+ ==========
+
+ Setting the java.io.tmpdir system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability for all Groovy versions.
+
+ Users who cannot easily move to the fixed Groovy versions may wish to consider using the JDK’s Files#createTempDirectory method instead of the Groovy extension methods.
CVE-2020-17521 created at 06 Dec 2020 09:43:27