Closed spmallette closed 5 years ago
There's now an additional reason to bump the dependency...
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3253
The MethodClosure class in runtime/MethodClosure.java in Apache Groovy 1.7.0 through 2.4.3 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted serialized object.
Fixed in Groovy v2.4.4:
http://groovy-lang.org/security.html
Whilst this bulletin does provide guidance on mitigation. one would still be stuck with alerts from security tools.
We could go up to Groovy 2.x but this would require making the script-security
plugin require Jenkins 2.x as well. So far we have not wanted to cut off 1.x users but maybe it is time now. workflow-cps
(for Pipeline) as of its latest security advisory does require 2.x, so the only reason to hold off would be to deliver non-security-related script-security
updates to non-Pipeline plugins with a 1.x baseline. But it has been over a year since 2.7.1 LTS was released, and there have been so many security advisories since then that anyone using 1.x would be better advised to just disable security and stop pretending, in which case they are unlikely to need such fixes anyway.
This library is using Groovy 2.x as of https://github.com/jenkinsci/groovy-sandbox/pull/35.
Seems that groovy-sandbox works well with Groovy 2.x when I exclude groovy 1.8 dependency in my pom, but it would be nice to see a dependency bump.
Kinda funny - we've been resisting the bump to Groovy 2.x in TinkerPop for a long time. Now, here I am requesting a groovy version bump consideration in someone else's lib. oh well.... :smile: