We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
This vulnerability exists due to a vulnerable method in the Apache Groovy Stdlib. See CVE-2020-17521.
grails-core/grails-shell/src/main/groovy/org/grails/cli/profile/commands/CreateAppCommand.groovy
Line 365 in bde0476
This vulnerability may impacts Grails users creating applications using the create-app command on shared Linux-like systems.
create-app
Setting the java.io.tmpdir system environment variable to a directory that is exclusively owned by the Grails user will fix this vulnerability.
java.io.tmpdir
File.createTempFile
This vulnerability was discovered by Jonathan Leitschuh
This vulnerability exists due to a vulnerable method in the Apache Groovy Stdlib. See CVE-2020-17521.
grails-core/grails-shell/src/main/groovy/org/grails/cli/profile/commands/CreateAppCommand.groovy
Line 365 in bde0476
Impact
This vulnerability may impacts Grails users creating applications using the
create-app
command on shared Linux-like systems.Workarounds
Setting the
java.io.tmpdir
system environment variable to a directory that is exclusively owned by the Grails user will fix this vulnerability.References
File.createTempFile
should not be used to create a directory (https://rules.sonarsource.com/java/tag/owasp/RSPEC-2976)Credit
This vulnerability was discovered by Jonathan Leitschuh