Show filters
47 Total Results
Displaying 31-40 of 47
Sort by:
Attacker Value
Unknown

CVE-2020-15776

Disclosure Date: September 18, 2020 (last updated February 22, 2025)
An issue was discovered in Gradle Enterprise 2018.2 - 2020.2.4. The CSRF prevention token is stored in a request cookie that is not annotated as HttpOnly. An attacker with the ability to execute arbitrary code in a user's browser could impose an arbitrary value for this token, allowing them to perform cross-site request forgery.
Attacker Value
Unknown

CVE-2020-15767

Disclosure Date: September 18, 2020 (last updated February 22, 2025)
An issue was discovered in Gradle Enterprise before 2020.2.5. The cookie used to convey the CSRF prevention token is not annotated with the “secure” attribute, which allows an attacker with the ability to MITM plain HTTP requests to obtain it, if the user mistakenly uses a HTTP instead of HTTPS address to access the server. This cookie value could then be used to perform CSRF.
Attacker Value
Unknown

CVE-2020-15772

Disclosure Date: September 18, 2020 (last updated February 22, 2025)
An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. When configuring Gradle Enterprise to integrate with a SAML identity provider, an XML metadata file can be uploaded by an administrator. The server side processing of this file dereferences XML External Entities (XXE), allowing a remote attacker with administrative access to perform server side request forgery.
Attacker Value
Unknown

CVE-2020-15769

Disclosure Date: September 18, 2020 (last updated February 22, 2025)
An issue was discovered in Gradle Enterprise 2020.2 - 2020.2.4. An XSS issue exists via the request URL.
Attacker Value
Unknown

CVE-2020-15771

Disclosure Date: September 18, 2020 (last updated February 22, 2025)
An issue was discovered in Gradle Enterprise 2018.2 and Gradle Enterprise Build Cache Node 4.1. Cross-site transmission of cookie containing CSRF token allows remote attacker to bypass CSRF mitigation.
Attacker Value
Unknown

CVE-2020-15775

Disclosure Date: September 18, 2020 (last updated February 22, 2025)
An issue was discovered in Gradle Enterprise 2017.1 - 2020.2.4. The /usage page of Gradle Enterprise conveys high level build information such as project names and build counts over time. This page is incorrectly viewable anonymously.
Attacker Value
Unknown

CVE-2020-15768

Disclosure Date: September 18, 2020 (last updated February 22, 2025)
An issue was discovered in Gradle Enterprise 2017.3 - 2020.2.4 and Gradle Enterprise Build Cache Node 1.0 - 9.2. Unrestricted HTTP header reflection in Gradle Enterprise allows remote attackers to obtain authentication cookies, if they are able to discover a separate XSS vulnerability. This potentially allows an attacker to impersonate another user. Gradle Enterprise affected application request paths:/info/headers, /cache-info/headers, /admin-info/headers, /distribution-broker-info/headers. Gradle Enterprise Build Cache Node affected application request paths:/cache-node-info/headers.
Attacker Value
Unknown

CVE-2020-15770

Disclosure Date: September 18, 2020 (last updated February 22, 2025)
An issue was discovered in Gradle Enterprise 2018.5. An attacker can potentially make repeated attempts to guess a local user's password, due to lack of lock-out after excessive failed logins.
Attacker Value
Unknown

CVE-2020-15774

Disclosure Date: September 18, 2020 (last updated February 22, 2025)
An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. An attacker with physical access to the browser of a user who has recently logged in to Gradle Enterprise and since closed their browser could reopen their browser to access Gradle Enterprise as that user.
Attacker Value
Unknown

CVE-2020-15777

Disclosure Date: August 25, 2020 (last updated February 22, 2025)
An issue was discovered in the Maven Extension plugin before 1.6 for Gradle Enterprise. The extension uses a socket connection to send serialized Java objects. Deserialization is not restricted to an allow-list, thus allowing an attacker to achieve code execution via a malicious deserialization gadget chain. The socket is not bound exclusively to localhost. The port this socket is assigned to is randomly selected and is not intentionally exposed to the public (either by design or documentation). This could potentially be used to achieve remote code execution and local privilege escalation.