First published: Fri Sep 18 2020(Updated: )
An issue was discovered in Gradle Enterprise before 2020.2.5. The cookie used to convey the CSRF prevention token is not annotated with the “secure” attribute, which allows an attacker with the ability to MITM plain HTTP requests to obtain it, if the user mistakenly uses a HTTP instead of HTTPS address to access the server. This cookie value could then be used to perform CSRF.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gradle Enterprise | <2020.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15767 is a vulnerability discovered in Gradle Enterprise before version 2020.2.5.
The severity of CVE-2020-15767 is medium with a CVSS score of 5.3.
CVE-2020-15767 affects Gradle Enterprise before version 2020.2.5.
CVE-2020-15767 allows an attacker with the ability to MITM plain HTTP requests to obtain the CSRF prevention token.
To fix CVE-2020-15767, upgrade to Gradle Enterprise version 2020.2.5 or later.