First published: Fri Sep 18 2020(Updated: )
An issue was discovered in Gradle Enterprise 2017.3 - 2020.2.4 and Gradle Enterprise Build Cache Node 1.0 - 9.2. Unrestricted HTTP header reflection in Gradle Enterprise allows remote attackers to obtain authentication cookies, if they are able to discover a separate XSS vulnerability. This potentially allows an attacker to impersonate another user. Gradle Enterprise affected application request paths:/info/headers, /cache-info/headers, /admin-info/headers, /distribution-broker-info/headers. Gradle Enterprise Build Cache Node affected application request paths:/cache-node-info/headers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gradle Enterprise | >=2017.3<=2020.2.4 | |
Gradle Enterprise Cache Node | >=1.0<=9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15768 is a vulnerability in Gradle Enterprise and Gradle Enterprise Build Cache Node that allows remote attackers to obtain authentication cookies through unrestricted HTTP header reflection, if a separate XSS vulnerability is discovered.
The severity of CVE-2020-15768 is high, with a severity value of 7.5.
CVE-2020-15768 affects Gradle Enterprise versions 2017.3 to 2020.2.4 by allowing remote attackers to obtain authentication cookies.
CVE-2020-15768 affects Gradle Enterprise Build Cache Node versions 1.0 to 9.2 by allowing remote attackers to obtain authentication cookies.
To mitigate CVE-2020-15768, it is recommended to apply the necessary updates and patches provided by Gradle.