Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6814

Опубликовано: 18 янв. 2018
Источник: debian
EPSS Низкий

Описание

When an application with unsupported Codehaus versions of Groovy from 1.7.0 to 2.4.3, Apache Groovy 2.4.4 to 2.4.7 on classpath uses standard Java serialization mechanisms, e.g. to communicate between servers or to store local data, it was possible for an attacker to bake a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects were subject to this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
groovyfixed2.4.8-1package
groovyfixed1.8.6-4+deb8u2jessiepackage
groovy2removedpackage
groovy2fixed2.2.2+dfsg-3+deb8u2jessiepackage

EPSS

Процентиль: 86%
0.02801
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 8 лет назад

When an application with unsupported Codehaus versions of Groovy from 1.7.0 to 2.4.3, Apache Groovy 2.4.4 to 2.4.7 on classpath uses standard Java serialization mechanisms, e.g. to communicate between servers or to store local data, it was possible for an attacker to bake a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects were subject to this vulnerability.

CVSS3: 9.6
redhat
почти 9 лет назад

When an application with unsupported Codehaus versions of Groovy from 1.7.0 to 2.4.3, Apache Groovy 2.4.4 to 2.4.7 on classpath uses standard Java serialization mechanisms, e.g. to communicate between servers or to store local data, it was possible for an attacker to bake a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects were subject to this vulnerability.

CVSS3: 9.8
nvd
почти 8 лет назад

When an application with unsupported Codehaus versions of Groovy from 1.7.0 to 2.4.3, Apache Groovy 2.4.4 to 2.4.7 on classpath uses standard Java serialization mechanisms, e.g. to communicate between servers or to store local data, it was possible for an attacker to bake a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects were subject to this vulnerability.

CVSS3: 9.8
github
больше 3 лет назад

Deserialization of Untrusted Data in Groovy

oracle-oval
около 8 лет назад

ELSA-2017-2486: groovy security update (IMPORTANT)

EPSS

Процентиль: 86%
0.02801
Низкий