First published: Tue Apr 09 2019(Updated: )
Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.googleapis.com web site.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gradle Gradle | >=1.4<=5.3.1 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11065 is a vulnerability in Gradle versions from 1.4 to 5.3.1 that allows for insecure HTTP download of dependencies when using the JavaScript or CoffeeScript Gradle plugins.
CVE-2019-11065 affects Gradle versions from 1.4 to 5.3.1 where dependency artifacts could be compromised by a man-in-the-middle (MITM) attack against the ajax.googleapis.com website.
CVE-2019-11065 has a severity rating of 5.9, which is considered medium.
To fix CVE-2019-11065, upgrade Gradle to a version higher than 5.3.1 or restrict the use of the JavaScript and CoffeeScript Gradle plugins.
You can find more information about CVE-2019-11065 on the GitHub pull request and the Fedora Project mailing lists.