Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.grails/grails-core
  4. ›
  5. CVE-2023-46131

CVE-2023-46131: Uncontrolled Resource Consumption

December 21, 2023 (updated January 2, 2024)

Grails is a framework used to build web applications with the Groovy programming language. A specially crafted web request can lead to a JVM crash or denial of service. Any Grails framework application using Grails data binding is vulnerable. This issue has been patched in version 3.3.17, 4.1.3, 5.3.4, 6.1.0.

References

  • github.com/grails/grails-core/commit/74326bdd2cf7dcb594092165e9464520f8366c60
  • github.com/grails/grails-core/commit/c401faaa6c24c021c758b95f72304a0e855a8db3
  • github.com/grails/grails-core/issues/13302
  • github.com/grails/grails-core/security/advisories/GHSA-3pjv-r7w4-2cf5
  • grails.org/blog/2023-12-20-cve-data-binding-dos.html
  • nvd.nist.gov/vuln/detail/CVE-2023-46131

Code Behaviors & Features

Detect and mitigate CVE-2023-46131 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.3.17, all versions starting from 4.0.0 before 4.1.3, all versions starting from 5.0.0 before 5.3.4, all versions starting from 6.0.0 before 6.1.0

Fixed versions

  • 3.3.17
  • 4.1.3
  • 5.3.4
  • 6.1.0

Solution

Upgrade to versions 3.3.17, 4.1.3, 5.3.4, 6.1.0 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Source file

maven/org.grails/grails-core/CVE-2023-46131.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:27 +0000.