Return-Path: X-Original-To: apmail-groovy-users-archive@minotaur.apache.org Delivered-To: apmail-groovy-users-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 33997186A2 for ; Thu, 16 Jul 2015 10:02:34 +0000 (UTC) Received: (qmail 75104 invoked by uid 500); 16 Jul 2015 10:02:34 -0000 Delivered-To: apmail-groovy-users-archive@groovy.apache.org Received: (qmail 75074 invoked by uid 500); 16 Jul 2015 10:02:34 -0000 Mailing-List: contact users-help@groovy.incubator.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: users@groovy.incubator.apache.org Delivered-To: mailing list users@groovy.incubator.apache.org Received: (qmail 75065 invoked by uid 99); 16 Jul 2015 10:02:34 -0000 Received: from Unknown (HELO spamd2-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 16 Jul 2015 10:02:34 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd2-us-west.apache.org (ASF Mail Server at spamd2-us-west.apache.org) with ESMTP id 920341A7151 for ; Thu, 16 Jul 2015 10:02:33 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd2-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: 3.991 X-Spam-Level: *** X-Spam-Status: No, score=3.991 tagged_above=-999 required=6.31 tests=[HTML_MESSAGE=3, KAM_LAZY_DOMAIN_SECURITY=1, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=disabled Received: from mx1-eu-west.apache.org ([10.40.0.8]) by localhost (spamd2-us-west.apache.org [10.40.0.9]) (amavisd-new, port 10024) with ESMTP id 38V-iEhpoKMg for ; Thu, 16 Jul 2015 10:02:25 +0000 (UTC) Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by mx1-eu-west.apache.org (ASF Mail Server at mx1-eu-west.apache.org) with SMTP id 01BE320F17 for ; Thu, 16 Jul 2015 10:02:23 +0000 (UTC) Received: (qmail 74727 invoked by uid 99); 16 Jul 2015 10:02:23 -0000 Received: from mail-relay.apache.org (HELO mail-relay.apache.org) (140.211.11.15) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 16 Jul 2015 10:02:23 +0000 Received: from mail-la0-f47.google.com (mail-la0-f47.google.com [209.85.215.47]) by mail-relay.apache.org (ASF Mail Server at mail-relay.apache.org) with ESMTPSA id 986321A003F; Thu, 16 Jul 2015 10:02:22 +0000 (UTC) Received: by lagx9 with SMTP id x9so40384653lag.1; Thu, 16 Jul 2015 03:02:21 -0700 (PDT) MIME-Version: 1.0 X-Received: by 10.112.10.166 with SMTP id j6mr7773176lbb.120.1437040941380; Thu, 16 Jul 2015 03:02:21 -0700 (PDT) Reply-To: cchampeau@apache.org Received: by 10.112.149.167 with HTTP; Thu, 16 Jul 2015 03:02:21 -0700 (PDT) Date: Thu, 16 Jul 2015 12:02:21 +0200 Message-ID: Subject: [CVE-2015-3253] Apache Groovy Zero-Day Vulnerability Disclosure From: =?UTF-8?Q?C=C3=A9dric_Champeau?= To: users@groovy.incubator.apache.org, dev@groovy.incubator.apache.org Cc: security@apache.org, oss-security@lists.openwall.com, bugtraq@securityfocus.com Content-Type: multipart/alternative; boundary=001a11347cfad6bad8051afb2aff --001a11347cfad6bad8051afb2aff Content-Type: text/plain; charset=UTF-8 *Severity*: Important *Vendor*: The Apache Software Foundation *Versions Affected*: All unsupported versions ranging from 1.7.0 to 2.4.3. *Impact* Remote execution of untrusted code, DoS *Description* When an application has Groovy on classpath and that it uses standard Java serialization mechanims to communicate between servers, or to store local data, it is possible for an attacker to bake a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability. *Mitigation* Apache Groovy 2.4.4 is the first and only supported release under the Apache Software Foundation. It is strongly recommanded that all users upgrade to this version. If you cannot upgrade or rely on an older, unsupported version of Groovy, you can apply the following patch on the MethodClosure class (src/main/org/codehaus/groovy/runtime/MethodClosure.java): public class MethodClosure extends Closure { + private Object readResolve() { + throw new UnsupportedOperationException(); + } *Credit* This vulnerability was discovered by: cpnrodzc7 working with HP's Zero Day Initiative *References* http://groovy-lang.org/security.html --001a11347cfad6bad8051afb2aff Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:

All unsupported versions ranging from = 1.7.0 to 2.4.3.

Impact

Remo= te execution of untrusted code, DoS

Descrip= tion

When an application has Groovy on classpath and that it uses standard Java=20 serialization mechanims to communicate between servers, or to store=20 local data, it is possible for an attacker to bake a special serialized=20 object that will execute code directly when deserialized. All=20 applications which rely on serialization and do not isolate the code=20 which deserializes objects are subject to this vulnerability.

Mitigation

Apache Groovy 2.4.4 is the first and only supported release under the Apache=20 Software Foundation. It is strongly recommanded that all users upgrade=20 to this version. If you cannot upgrade or rely on an older, unsupported=20 version of Groovy, you can apply the following patch on the=20 MethodClosure class (src/main/org/codehaus/groovy/runtime/MethodClosure.jav= a):

=C2=A0public class MethodClosure extends Clos= ure {
+=C2=A0=C2=A0=C2=A0 private Object readResolve() {
+=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 throw new UnsupportedOperationExcep= tion();
+=C2=A0=C2=A0=C2=A0 }

Credit

This vulnerability was discovered by:

=C2=A0 =C2=A0cpnrodzc7 working with HP's Zero Day Initiative

References

http://groovy-lang.org/security.html --001a11347cfad6bad8051afb2aff--