8 results (0.013 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Grails is a framework used to build web applications with the Groovy programming language. A specially crafted web request can lead to a JVM crash or denial of service. Any Grails framework application using Grails data binding is vulnerable. This issue has been patched in version 3.3.17, 4.1.3, 5.3.4, 6.1.0. Grails es un framework utilizado para crear aplicaciones web con el lenguaje de programación Groovy. • https://github.com/grails/grails-core/commit/74326bdd2cf7dcb594092165e9464520f8366c60 https://github.com/grails/grails-core/commit/c401faaa6c24c021c758b95f72304a0e855a8db3 https://github.com/grails/grails-core/issues/13302 https://github.com/grails/grails-core/security/advisories/GHSA-3pjv-r7w4-2cf5 https://grails.org/blog/2023-12-20-cve-data-binding-dos.html • CWE-400: Uncontrolled Resource Consumption •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

In grails-databinding in Grails before 3.3.15, 4.x before 4.1.1, 5.x before 5.1.9, and 5.2.x before 5.2.1 (at least when certain Java 8 configurations are used), data binding allows a remote attacker to execute code by gaining access to the class loader. En grails-databinding en Grails versiones anteriores a 3.3.15, 4.x anteriores a 4.1.1, 5.x anteriores a 5.1.9, y 5.2.x anteriores a 5.2.1 (al menos cuando son usadas determinadas configuraciones de Java 8), la vinculación de datos permite a un atacante remoto ejecutar código al conseguir acceso al cargador de clases. • http://www.openwall.com/lists/oss-security/2022/07/20/4 https://github.com/grails/grails-core/issues/12626 https://github.com/grails/grails-core/security/advisories/GHSA-6rh6-x8ww-9h97 https://grails.org/blog/2022-07-18-rce-vulnerability.html •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

Grails before 3.3.10 used cleartext HTTP to resolve the SDKMan notification service. NOTE: users' apps were not resolving dependencies over cleartext HTTP. Grails anterior de la versión 3.3.10 usaba cleartext HTTP para resolver el servicio de notificación SDKMan. NOTA: las aplicaciones de los usuarios no resolvían las posesiones a través de HTTP de texto simple. • https://github.com/grails/grails-core/issues/11250 https://objectcomputing.com/news/2019/05/30/possible-grails-mitm-vulnerability • CWE-494: Download of Code Without Integrity Check •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

Cross-site request forgery (CSRF) vulnerability in Grails console (aka Grails Debug Console and Grails Web Console) 2.0.7, 1.5.10, and earlier allows remote attackers to hijack the authentication of users for requests that execute arbitrary Groovy code via unspecified vectors. Vulnerabilidad de CSRF en la consola de Grails (también conocida como Grails Debug Console y Grails Web Console) 2.0.7, 1.5.10 y versiones anteriores permite a atacantes remotos secuestrar la autenticación de usuarios para solicitudes que ejecuten código Groovy arbitrario a través de vectores no especificados. • http://www.openwall.com/lists/oss-security/2016/08/02/11 http://www.openwall.com/lists/oss-security/2016/08/02/2 http://www.openwall.com/lists/oss-security/2016/08/03/9 http://www.securityfocus.com/bid/92267 https://github.com/sheehan/grails-console/issues/54 https://github.com/sheehan/grails-console/issues/55 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.0EPSS: 0%CPEs: 38EXPL: 0

Directory traversal vulnerability in the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 through 2.3.6 allows remote attackers to obtain sensitive information via unspecified vectors related to a "configured block." NOTE: this issue was SPLIT from CVE-2014-0053 per ADT2 due to different vulnerability types. Vulnerabilidad de salto de directorio en el plugin Resources 1.0.0 anterior a 1.2.6 para Pivotal Grails 2.0.0 hasta 2.3.6 permite a atacantes remotos obtener información sensible a través de vectores desconocidos relacionados con un "bloque configurado." NOTA: este problema fue dividido (SPLIT) de CVE-2014-0053 por ADT2 debido a diferentes tipos de vulnerabilidades. • http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0267.html http://www.gopivotal.com/security/cve-2014-0053 http://www.securityfocus.com/archive/1/531281/100/0/threaded • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •