#VU43455 Permissions, Privileges, and Access Controls in Grails


Published: 2012-09-29 | Updated: 2020-08-11

Vulnerability identifier: #VU43455

Vulnerability risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-1833

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Grails
Web applications / CMS

Vendor: Grails

Description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

VMware SpringSource Grails before 1.3.8, and 2.x before 2.0.2, does not properly restrict data binding, which might allow remote attackers to bypass intended access restrictions and modify arbitrary object properties via a crafted request parameter to an application.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Grails: 1.1.0 - 1.3.6, 2.0 - 2.0.1


External links
http://secunia.com/advisories/51113
http://support.springsource.com/security/cve-2012-1833
http://www.securityfocus.com/bid/55763


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability