We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
This vulnerability exists due to a vulnerable method in the Apache Groovy Stdlib. See CVE-2020-17521.
https://github.com/grails/grails-core/blob/bde047607fe4f04face70a53cfc9a45747b9c611/grails-shell/src/main/groovy/org/grails/cli/profile/commands/CreateAppCommand.groovy#L365
This vulnerability may impacts Grails users creating applications using the create-app command on shared Linux-like systems.
create-app
Setting the java.io.tmpdir system environment variable to a directory that is exclusively owned by the Grails user will fix this vulnerability.
java.io.tmpdir
File.createTempFile
This vulnerability was discovered by Jonathan Leitschuh
This vulnerability exists due to a vulnerable method in the Apache Groovy Stdlib. See CVE-2020-17521.
https://github.com/grails/grails-core/blob/bde047607fe4f04face70a53cfc9a45747b9c611/grails-shell/src/main/groovy/org/grails/cli/profile/commands/CreateAppCommand.groovy#L365
Impact
This vulnerability may impacts Grails users creating applications using the
create-app
command on shared Linux-like systems.Workarounds
Setting the
java.io.tmpdir
system environment variable to a directory that is exclusively owned by the Grails user will fix this vulnerability.References
File.createTempFile
should not be used to create a directory (https://rules.sonarsource.com/java/tag/owasp/RSPEC-2976)Credit
This vulnerability was discovered by Jonathan Leitschuh