First published: Fri Sep 18 2020(Updated: )
An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. When configuring Gradle Enterprise to integrate with a SAML identity provider, an XML metadata file can be uploaded by an administrator. The server side processing of this file dereferences XML External Entities (XXE), allowing a remote attacker with administrative access to perform server side request forgery.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gradle Enterprise | >=2018.5<=2020.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-15772 is medium.
The affected software for CVE-2020-15772 is Gradle Enterprise versions 2018.5 to 2020.2.4.
CVE-2020-15772 allows remote attackers to perform XXE attacks by uploading a malicious XML metadata file during the configuration of Gradle Enterprise to integrate with a SAML identity provider.
Yes, please refer to the vendor's advisory for information on how to apply the necessary patches or upgrades to fix CVE-2020-15772.
The Common Weakness Enumeration (CWE) ID for CVE-2020-15772 is CWE-611 and CWE-918.