Advisory Details

July 20th, 2015

Apache Groovy Deserialization of Untrusted Data Remote Code Execution Vulnerability

ZDI-15-365
ZDI-CAN-2947

CVE ID CVE-2015-3253
CVSS SCORE 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P
AFFECTED VENDORS Apache
Elastic
AFFECTED PRODUCTS Groovy
Elasticsearch
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apache Groovy. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the Closure implementation which accepts and deserializes a Java serialized binary stream. An attacker can leverage this vulnerability to execute arbitrary code under the context of the user.

ADDITIONAL DETAILS Apache has issued an update to correct this vulnerability. More details can be found at:
http://groovy-lang.org/security.html
Elastic has issued an update to correct this vulnerability. More details can be found at:
https://www.elastic.co/community/security
DISCLOSURE TIMELINE
  • 2015-06-30 - Vulnerability reported to vendor
  • 2015-07-20 - Coordinated public release of advisory
CREDIT cpnrodzc7
BACK TO ADVISORIES