Details
-
Dependency upgrade
-
Status: Closed
-
Major
-
Resolution: Fixed
-
3.0.6
-
None
-
None
-
Patch
Description
As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process.
[1] CVE Reference
[2] Apache Ant Security Reports
Overall risk assessment for Groovy: low
Details:
- Groovy's internal usage of Ant is not affected by the above mentioned CVE.
- We encourage Groovy users using Groovy in combination with Ant, e.g. AntBuilder to read the Apache Ant Security Report[1] and follow the mitigation advice. In particular, anyone using the fixcrlf Ant task should take note.
- Recent Groovy versions, e.g. 3.0.6, have been built against Ant 1.10.8 but do not require that version and can safely be used with Ant 1.10.9 which has additional protections against the vulnerability mentioned in the CVE.