We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
This vulnerability exists due to a vulnerable method in the Apache Groovy Stdlib. See CVE-2020-17521.
https://github.com/grails/grails-core/blob/bde047607fe4f04face70a53cfc9a45747b9c611/grails-shell/src/main/groovy/org/grails/cli/profile/commands/CreateAppCommand.groovy#L365
This vulnerability may impacts Grails users creating applications using the create-app command on shared Linux-like systems.
create-app
Setting the java.io.tmpdir system environment variable to a directory that is exclusively owned by the Grails user will fix this vulnerability.
java.io.tmpdir
File.createTempFile
This vulnerability was discovered by Jonathan Leitschuh
This vulnerability exists due to a vulnerable method in the Apache Groovy Stdlib. See CVE-2020-17521.
https://github.com/grails/grails-core/blob/bde047607fe4f04face70a53cfc9a45747b9c611/grails-shell/src/main/groovy/org/grails/cli/profile/commands/CreateAppCommand.groovy#L365
Impact
This vulnerability may impacts Grails users creating applications using the
create-app
command on shared Linux-like systems.Workarounds
Setting the
java.io.tmpdir
system environment variable to a directory that is exclusively owned by the Grails user will fix this vulnerability.References
File.createTempFile
should not be used to create a directory (https://rules.sonarsource.com/java/tag/owasp/RSPEC-2976)Credit
This vulnerability was discovered by Jonathan Leitschuh