7 results (0.013 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Grails is a framework used to build web applications with the Groovy programming language. A specially crafted web request can lead to a JVM crash or denial of service. Any Grails framework application using Grails data binding is vulnerable. This issue has been patched in version 3.3.17, 4.1.3, 5.3.4, 6.1.0. Grails es un framework utilizado para crear aplicaciones web con el lenguaje de programación Groovy. • https://github.com/grails/grails-core/commit/74326bdd2cf7dcb594092165e9464520f8366c60 https://github.com/grails/grails-core/commit/c401faaa6c24c021c758b95f72304a0e855a8db3 https://github.com/grails/grails-core/issues/13302 https://github.com/grails/grails-core/security/advisories/GHSA-3pjv-r7w4-2cf5 https://grails.org/blog/2023-12-20-cve-data-binding-dos.html • CWE-400: Uncontrolled Resource Consumption •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

Grails before 3.3.10 used cleartext HTTP to resolve the SDKMan notification service. NOTE: users' apps were not resolving dependencies over cleartext HTTP. Grails anterior de la versión 3.3.10 usaba cleartext HTTP para resolver el servicio de notificación SDKMan. NOTA: las aplicaciones de los usuarios no resolvían las posesiones a través de HTTP de texto simple. • https://github.com/grails/grails-core/issues/11250 https://objectcomputing.com/news/2019/05/30/possible-grails-mitm-vulnerability • CWE-494: Download of Code Without Integrity Check •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

Cross-site request forgery (CSRF) vulnerability in Grails console (aka Grails Debug Console and Grails Web Console) 2.0.7, 1.5.10, and earlier allows remote attackers to hijack the authentication of users for requests that execute arbitrary Groovy code via unspecified vectors. Vulnerabilidad de CSRF en la consola de Grails (también conocida como Grails Debug Console y Grails Web Console) 2.0.7, 1.5.10 y versiones anteriores permite a atacantes remotos secuestrar la autenticación de usuarios para solicitudes que ejecuten código Groovy arbitrario a través de vectores no especificados. • http://www.openwall.com/lists/oss-security/2016/08/02/11 http://www.openwall.com/lists/oss-security/2016/08/02/2 http://www.openwall.com/lists/oss-security/2016/08/03/9 http://www.securityfocus.com/bid/92267 https://github.com/sheehan/grails-console/issues/54 https://github.com/sheehan/grails-console/issues/55 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.0EPSS: 0%CPEs: 38EXPL: 0

Directory traversal vulnerability in the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 through 2.3.6 allows remote attackers to obtain sensitive information via unspecified vectors related to a "configured block." NOTE: this issue was SPLIT from CVE-2014-0053 per ADT2 due to different vulnerability types. Vulnerabilidad de salto de directorio en el plugin Resources 1.0.0 anterior a 1.2.6 para Pivotal Grails 2.0.0 hasta 2.3.6 permite a atacantes remotos obtener información sensible a través de vectores desconocidos relacionados con un "bloque configurado." NOTA: este problema fue dividido (SPLIT) de CVE-2014-0053 por ADT2 debido a diferentes tipos de vulnerabilidades. • http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0267.html http://www.gopivotal.com/security/cve-2014-0053 http://www.securityfocus.com/archive/1/531281/100/0/threaded • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 0%CPEs: 38EXPL: 0

The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 through 2.3.6 does not properly restrict access to files in the META-INF directory, which allows remote attackers to obtain sensitive information via a direct request. NOTE: this issue was SPLIT from CVE-2014-0053 due to different researchers per ADT5. La configuración por defecto del plugin Resources 1.0.0 anterior a 1.2.6 para Pivotal Grails 2.0.0 hasta 2.3.6 no restringe debidamente acceso a archivos en el directorio META-INF, lo que permite a atacantes remotos obtener información sensible a través de una solicitud directa. NOTA: este problema fue dividido (SPLIT) de CVE-2014-0053 debido a investigadores diferentes por ADT5. • http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0267.html http://www.gopivotal.com/security/cve-2014-0053 http://www.securityfocus.com/archive/1/531281/100/0/threaded • CWE-264: Permissions, Privileges, and Access Controls •