Show filters
47 Total Results
Displaying 41-47 of 47
Sort by:
Attacker Value
Unknown

CVE-2020-7599

Disclosure Date: March 30, 2020 (last updated February 21, 2025)
All versions of com.gradle.plugin-publish before 0.11.0 are vulnerable to Insertion of Sensitive Information into Log File. When a plugin author publishes a Gradle plugin while running Gradle with the --info log level flag, the Gradle Logger logs an AWS pre-signed URL. If this build log is publicly visible (as it is in many popular public CI systems like TravisCI) this AWS pre-signed URL would allow a malicious actor to replace a recently uploaded plugin with their own.
Attacker Value
Unknown

CVE-2019-16370

Disclosure Date: September 16, 2019 (last updated November 27, 2024)
The PGP signing plugin in Gradle before 6.0 relies on the SHA-1 algorithm, which might allow an attacker to replace an artifact with a different one that has the same SHA-1 message digest, a related issue to CVE-2005-4900.
Attacker Value
Unknown

CVE-2019-15052

Disclosure Date: August 14, 2019 (last updated November 27, 2024)
The HTTP client in Gradle before 5.6 sends authentication credentials originally destined for the configured host. If that host returns a 30x redirect, Gradle also sends those credentials to all subsequent hosts that the request redirects to. This is similar to CVE-2018-1000007.
Attacker Value
Unknown

CVE-2019-11402

Disclosure Date: April 22, 2019 (last updated November 27, 2024)
In Gradle Enterprise before 2018.5.3, Build Cache Nodes did not store the credentials at rest in an encrypted format.
Attacker Value
Unknown

CVE-2019-11403

Disclosure Date: April 22, 2019 (last updated November 27, 2024)
In Gradle Enterprise before 2018.5.2, Build Cache Nodes would reflect the configured password back when viewing the HTML page source of the settings page.
Attacker Value
Unknown

CVE-2019-11065

Disclosure Date: April 10, 2019 (last updated November 08, 2023)
Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.googleapis.com web site.
Attacker Value
Unknown

CVE-2016-6199

Disclosure Date: February 07, 2017 (last updated November 26, 2024)
ObjectSocketWrapper.java in Gradle 2.12 allows remote attackers to execute arbitrary code via a crafted serialized object.
0