Groovy: Arbitrary code execution Groovy is vulnerable to a remote execution of arbitrary code when java serialization is used. groovy 2016-10-06 2016-10-06 555470 remote 2.4.5 2.4.5

A multi-faceted language for the Java platform

Groovy’s MethodClosure class, in runtime/MethodClosure.java, is vulnerable to a crafted serialized object.

Remote attackers could potentially execute arbitrary code, or cause Denial of Service condition

A workaround exists by using a custom security policy file utilizing the standard Java security manager, or do not rely on serialization to communicate remotely.

All Groovy users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/groovy-2.4.5"
CVE-2015-3253 b-man b-man