First published: Fri Sep 18 2020(Updated: )
An issue was discovered in Gradle Enterprise before 2020.2.4. Because of unrestricted cross-origin requests to read-only data in the Export API, an attacker can access data as a user (for the duration of the browser session) after previously explicitly authenticating with the API.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gradle Enterprise | <2020.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15773 is a vulnerability in Gradle Enterprise before version 2020.2.4 that allows unrestricted cross-origin requests to read-only data in the Export API.
CVE-2020-15773 has a severity score of 6.5 (medium).
The affected software is Gradle Enterprise version up to and excluding 2020.2.4.
The CWE of CVE-2020-15773 is CWE-346.
An attacker can exploit this vulnerability by making unrestricted cross-origin requests to read-only data in the Export API, allowing them to access data as a user after authenticating with the API.