Critical severity9.8NVD Advisory· Published Aug 13, 2015· Updated May 6, 2026
CVE-2015-3253
CVE-2015-3253
Description
The MethodClosure class in runtime/MethodClosure.java in Apache Groovy 1.7.0 through 2.4.3 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted serialized object.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.codehaus.groovy:groovyMaven | >= 1.7.0, < 2.4.4 | 2.4.4 |
org.codehaus.groovy:groovy-allMaven | >= 1.7.0, < 2.4.4 | 2.4.4 |
Affected products
120cpe:2.3:a:apache:groovy:1.7.0:*:*:*:*:*:*:*+ 102 more
- cpe:2.3:a:apache:groovy:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.0:beta_1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.0:beta_2:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.10:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.11:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.7.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.0:beta_1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.0:beta_2:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.0:beta_3:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.0:beta_4:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.8.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.9.0:beta_1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.9.0:beta_3:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:1.9.0:beta_4:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.0:beta_1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.0:beta_2:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.0:beta_3:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.1.0:beta_1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.1.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.1.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.1.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.2.0:beta_1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.2.0:beta_2:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.2.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.2.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.0:beta_1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.0:beta_2:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.4.0:beta_1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.4.0:beta_2:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.4.0:beta_3:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.4.0:beta_4:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.4.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.4.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:groovy:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:health_sciences_clinical_development_center:3.1.1:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:oracle:health_sciences_clinical_development_center:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:health_sciences_clinical_development_center:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_order_broker_cloud_service:15.0:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:oracle:retail_order_broker_cloud_service:15.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_order_broker_cloud_service:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_order_broker_cloud_service:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_order_broker_cloud_service:5.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_service_backbone:13.0:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:oracle:retail_service_backbone:13.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_service_backbone:13.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_service_backbone:13.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_service_backbone:14.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_service_backbone:14.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_store_inventory_management:13.2:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:oracle:retail_store_inventory_management:13.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_store_inventory_management:14.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:retail_store_inventory_management:14.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:webcenter_sites:12.2.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
28- www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlnvdPatchThird Party AdvisoryWEB
- www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlnvdPatchThird Party AdvisoryWEB
- groovy-lang.org/security.htmlnvdVendor AdvisoryWEB
- packetstormsecurity.com/files/132714/Apache-Groovy-2.4.3-Code-Execution.htmlnvdMitigationThird Party AdvisoryVDB EntryWEB
- www.securityfocus.com/bid/75919nvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/91787nvdThird Party AdvisoryVDB Entry
- www.zerodayinitiative.com/advisories/ZDI-15-365/nvdThird Party AdvisoryVDB Entry
- github.com/advisories/GHSA-qg25-hgjv-cg9qghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2015-3253ghsaADVISORY
- rhn.redhat.com/errata/RHSA-2016-0066.htmlnvdWEB
- www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlnvdWEB
- www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlnvdWEB
- www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlnvdWEB
- www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlnvdWEB
- www.zerodayinitiative.com/advisories/ZDI-15-365ghsaWEB
- access.redhat.com/errata/RHSA-2016:1376nvdWEB
- access.redhat.com/errata/RHSA-2017:2486nvdWEB
- access.redhat.com/errata/RHSA-2017:2596nvdWEB
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdWEB
- lists.apache.org/thread.html/rbb8e16cc5acab183124572b655bdf5fe1d5b5f477dc267352426c7ed@%3Cnotifications.shardingsphere.apache.org%3EghsaWEB
- security.gentoo.org/glsa/201610-01nvdWEB
- security.netapp.com/advisory/ntap-20160623-0001ghsaWEB
- www.oracle.com/security-alerts/cpuapr2020.htmlnvdWEB
- www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlnvdWEB
- www.securityfocus.com/archive/1/536012/100/0/threadednvd
- www.securitytracker.com/id/1034815nvd
- lists.apache.org/thread.html/rbb8e16cc5acab183124572b655bdf5fe1d5b5f477dc267352426c7ed%40%3Cnotifications.shardingsphere.apache.org%3Envd
- security.netapp.com/advisory/ntap-20160623-0001/nvd
News mentions
0No linked articles in our index yet.