Vulnerability Name: | CVE-2020-15772 | ||||||||||||
Assigned: | 2020-09-18 | ||||||||||||
Published: | 2020-09-18 | ||||||||||||
Updated: | 2022-09-30 | ||||||||||||
Summary: | An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. When configuring Gradle Enterprise to integrate with a SAML identity provider, an XML metadata file can be uploaded by an administrator. The server side processing of this file dereferences XML External Entities (XXE), allowing a remote attacker with administrative access to perform server side request forgery. | ||||||||||||
CVSS v3 Severity: | 4.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)
| ||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-611 CWE-918 | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-15772 Source: MISC Type: Third Party Advisory https://github.com/gradle/gradle/security/advisories Source: CONFIRM Type: Vendor Advisory https://security.gradle.com/advisory/CVE-2020-15772 | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
Vulnerability Name: | CVE-2020-15772 (CCN-188462) | ||||||||||||
Assigned: | 2020-09-15 | ||||||||||||
Published: | 2020-09-15 | ||||||||||||
Updated: | 2020-11-09 | ||||||||||||
Summary: | An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. When configuring Gradle Enterprise to integrate with a SAML identity provider, an XML metadata file can be uploaded by an administrator. The server side processing of this file dereferences XML External Entities (XXE), allowing a remote attacker with administrative access to perform server side request forgery. | ||||||||||||
CVSS v3 Severity: | 4.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) 4.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-611 CWE-918 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-15772 Source: XF Type: UNKNOWN gradle-cve202015772-ssrf(188462) Source: MISC Type: Third Party Advisory https://github.com/gradle/gradle/security/advisories Source: CCN Type: Gradle Security Advisory SAML IDP metadata XML upload is vulnerable to server-side request forgery via XXE injection Source: CONFIRM Type: Vendor Advisory https://security.gradle.com/advisory/CVE-2020-15772 | ||||||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||||||
BACK |