Vulnerability Name: | CVE-2020-15768 | ||||||||||||
Assigned: | 2020-09-18 | ||||||||||||
Published: | 2020-09-18 | ||||||||||||
Updated: | 2022-09-30 | ||||||||||||
Summary: | An issue was discovered in Gradle Enterprise 2017.3 - 2020.2.4 and Gradle Enterprise Build Cache Node 1.0 - 9.2. Unrestricted HTTP header reflection in Gradle Enterprise allows remote attackers to obtain authentication cookies, if they are able to discover a separate XSS vulnerability. This potentially allows an attacker to impersonate another user. Gradle Enterprise affected application request paths:/info/headers, /cache-info/headers, /admin-info/headers, /distribution-broker-info/headers. Gradle Enterprise Build Cache Node affected application request paths:/cache-node-info/headers. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-15768 Source: MISC Type: Third Party Advisory https://github.com/gradle/gradle/security/advisories Source: CONFIRM Type: Vendor Advisory https://security.gradle.com/advisory/CVE-2020-15768 | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
Vulnerability Name: | CVE-2020-15768 (CCN-188458) | ||||||||||||
Assigned: | 2020-09-15 | ||||||||||||
Published: | 2020-09-15 | ||||||||||||
Updated: | 2020-11-09 | ||||||||||||
Summary: | An issue was discovered in Gradle Enterprise 2017.3 - 2020.2.4 and Gradle Enterprise Build Cache Node 1.0 - 9.2. Unrestricted HTTP header reflection in Gradle Enterprise allows remote attackers to obtain authentication cookies, if they are able to discover a separate XSS vulnerability. This potentially allows an attacker to impersonate another user. Gradle Enterprise affected application request paths:/info/headers, /cache-info/headers, /admin-info/headers, /distribution-broker-info/headers. Gradle Enterprise Build Cache Node affected application request paths:/cache-node-info/headers. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-15768 Source: XF Type: UNKNOWN gradle-cve202015768-info-disc(188458) Source: MISC Type: Third Party Advisory https://github.com/gradle/gradle/security/advisories Source: CCN Type: Gradle Security Advisory Potential disclosure of session cookies via header reflection Source: CONFIRM Type: Vendor Advisory https://security.gradle.com/advisory/CVE-2020-15768 | ||||||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||||||
BACK |