First published: Fri Sep 18 2020(Updated: )
An issue was discovered in Gradle Enterprise 2018.2 - 2020.2.4. The CSRF prevention token is stored in a request cookie that is not annotated as HttpOnly. An attacker with the ability to execute arbitrary code in a user's browser could impose an arbitrary value for this token, allowing them to perform cross-site request forgery.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gradle Enterprise | >=2018.2<=2020.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-15776 is high (8.8).
CVE-2020-15776 allows an attacker to impose an arbitrary value for the CSRF prevention token, potentially leading to unauthorized actions.
Gradle Enterprise versions 2018.2 through 2020.2.4 are affected by CVE-2020-15776.
The CWE ID for CVE-2020-15776 is CWE-352 and CWE-732.
To fix CVE-2020-15776, update Gradle Enterprise to a version higher than 2020.2.4.