CVE-2022-35912 – org.grails:grails-databinding
Package
Manager: maven
Name: org.grails:grails-databinding
Vulnerable Version: >=3.3.10 <3.3.15 || >=4.0.0 <4.1.1 || >=5.0.0 <5.1.9 || =5.2.0 || >=5.2.0 <5.2.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.05197 pctl0.89531
Details
Grails framework Remote Code Execution via Data Binding ### Impact A vulnerability has been discovered in the Grails data-binding logic which allows for Remote Code Execution in a Grails application. This exploit requires the application to be running on Java 8, either deployed as a WAR to a servlet container, or an executable JAR. ### Patches Grails framework versions 5.2.1, 5.1.9, 4.1.1, and 3.3.15 ### References https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35912 https://grails.org/blog/2022-07-18-rce-vulnerability.html ### For more information If you have any questions or comments about this advisory: * https://grails.org/blog/2022-07-18-rce-vulnerability.html * https://github.com/grails/grails-core/issues/12626 * Email us at [info@grails.org](mailto:info@grails.org) ### Credit This vulnerability was discovered by [meizjm3i](https://github.com/meizjm3i) and [codeplutos](https://github.com/codeplutos) of AntGroup FG Security Lab
Metadata
Created: 2022-07-21T21:38:28Z
Modified: 2022-07-29T17:38:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-6rh6-x8ww-9h97/GHSA-6rh6-x8ww-9h97.json
CWE IDs: []
Alternative ID: GHSA-6rh6-x8ww-9h97
Finding: F096
Auto approve: 1