CVE-2015-3253

CVSS V2 High 7.5 CVSS V3 Critical 9.8
Description
The MethodClosure class in runtime/MethodClosure.java in Apache Groovy 1.7.0 through 2.4.3 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted serialized object.
Overview
  • CVE ID
  • CVE-2015-3253
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2015-08-13T14:59:02
  • Last Modified Date
  • 2020-06-24T05:15:11
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:apache:groovy:1.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.0:beta_1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.0:beta_2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.0:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.7.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.0:beta_1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.0:beta_2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.0:beta_3:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.0:beta_4:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.0:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.0:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.0:rc4:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.8.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.9.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.9.0:beta_1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.9.0:beta_3:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:1.9.0:beta_4:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.0:beta_1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.0:beta_2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.0:beta_3:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.0:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.0:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.0:rc4:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.1.0:beta_1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.1.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.1.0:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.1.0:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.1.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.1.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.1.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.1.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.1.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.1.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.2.0:beta_1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.2.0:beta_2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.2.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.2.0:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.2.0:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.0:beta_1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.0:beta_2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.0:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.0:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.3.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.4.0:beta_1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.4.0:beta_2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.4.0:beta_3:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.4.0:beta_4:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.4.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.4.0:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:groovy:2.4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:health_sciences_clinical_development_center:3.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:health_sciences_clinical_development_center:3.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_order_broker_cloud_service:4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_order_broker_cloud_service:5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_order_broker_cloud_service:5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_order_broker_cloud_service:15.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_service_backbone:13.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_service_backbone:13.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_service_backbone:13.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_service_backbone:14.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_service_backbone:14.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_store_inventory_management:13.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_store_inventory_management:14.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_store_inventory_management:14.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:webcenter_sites:12.2.1:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 7.5
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
http://packetstormsecurity.com/files/132714/Apache-Groovy-2.4.3-Code-Execution.html Mitigation Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/75919 Third Party Advisory VDB Entry
http://groovy-lang.org/security.html Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-15-365/ Third Party Advisory VDB Entry
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html Patch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html Patch Third Party Advisory
http://www.securityfocus.com/bid/91787 Third Party Advisory VDB Entry
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
http://rhn.redhat.com/errata/RHSA-2016-0066.html
https://security.gentoo.org/glsa/201610-01
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.securitytracker.com/id/1034815
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
https://security.netapp.com/advisory/ntap-20160623-0001/
https://access.redhat.com/errata/RHSA-2017:2596
https://access.redhat.com/errata/RHSA-2017:2486
https://access.redhat.com/errata/RHSA-2016:1376
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/archive/1/536012/100/0/threaded
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://lists.apache.org/thread.html/rbb8e16cc5acab183124572b655bdf5fe1d5b5f477dc267352426c7ed@%3Cnotifications.shardingsphere.apache.org%3E
History
Created Old Value New Value Data Type Notes
2022-05-10 16:42:07 Added to TrackCVE
2022-12-02 05:50:57 2015-08-13T14:59Z 2015-08-13T14:59:02 CVE Published Date updated
2022-12-02 05:50:57 2020-06-24T05:15:11 CVE Modified Date updated
2022-12-02 05:50:57 Modified Vulnerability Status updated