First published: Fri Sep 18 2020(Updated: )
An issue was discovered in Gradle Enterprise 2018.2 and Gradle Enterprise Build Cache Node 4.1. Cross-site transmission of cookie containing CSRF token allows remote attacker to bypass CSRF mitigation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gradle Enterprise | =2018.2 | |
Gradle Enterprise Cache Node | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-15771.
The severity of CVE-2020-15771 is high (7.5).
The affected software for CVE-2020-15771 includes Gradle Enterprise 2018.2 and Gradle Enterprise Build Cache Node 4.1.
CVE-2020-15771 allows remote attackers to bypass CSRF mitigation by performing a cross-site transmission of a cookie containing a CSRF token.
You can find more information about CVE-2020-15771 at the following references: [GitHub Advisory](https://github.com/gradle/gradle/security/advisories) and [Security Advisory](https://security.gradle.com/advisory/CVE-2020-15771).