Sicherheit: Ausführen beliebiger Kommandos in groovy-sandbox
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in groovy-sandbox
ID: FEDORA-2015-5643
Distribution: Fedora
Plattformen: Fedora 22
Datum: Di, 21. April 2015, 23:46
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1806
Applikationen: groovy-sandbox


Name        : groovy-sandbox
Product : Fedora 22
Version : 1.8
Release : 1.fc22
URL : http://groovy-sandbox.kohsuke.org
Summary : Groovy sandbox for executing untrusted Groovy scripts safely
Description :
This project defines a Groovy CompilationCustomizer, which allows a
program to execute Groovy script in a restricted sandbox environment. It
is useful for applications that want to provide some degree of
scriptability to users, without allowing them to execute System.exit(0)
or any other undesirable operations.

This compile-time transformation modifies untrusted Groovy script in
such a way that every operation that can cause interactions with the
external world gets intercepted. This allows your code to examine and
deny executions. This includes every method call, object allocations,
property/attribute access, array access, and so on.

Update Information:

Fix CVE-2015-1806 (SECURITY-125)

This update can be installed with the "yum" update program. Use
su -c 'yum update groovy-sandbox' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Pro-Linux @Facebook
Neue Nachrichten