Severity |
|
Remote |
|
Type |
- |
Unknown |
+ |
Privilege escalation |
|
Description |
+ |
Groovy before version 2.5.14 may create temporary directories within the OS temporary directory which is shared between all users on affected systems. Groovy will create such directories for internal use when producing Java Stubs or on behalf of user code via two extension methods for creating temporary directories. If Groovy user code uses either of these extension methods, and stores executable code in the resulting temporary directory, this can lead to local privilege escalation. If such Groovy code is making use of the temporary directory to store sensitive information, such information could be exposed or modified. |
|
References |
+ |
https://issues.apache.org/jira/browse/GROOVY-9824 |
+ |
https://github.com/apache/groovy/commit/98dc5d713926cd81b006c510a1546ccd520fe17f |
|
Notes |
+ |
Workaround |
+ |
========== |
+ |
|
+ |
Setting the java.io.tmpdir system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability for all Groovy versions. |
+ |
|
+ |
Users who cannot easily move to the fixed Groovy versions may wish to consider using the JDK’s Files#createTempDirectory method instead of the Groovy extension methods. |
|