First published: Tue Feb 09 2021(Updated: )
A directory traversal issue was discovered in Gradle gradle-enterprise-test-distribution-agent before 1.3.2, test-distribution-gradle-plugin before 1.3.2, and gradle-enterprise-maven-extension before 1.8.2. A malicious actor (with certain credentials) can perform a registration step such that crafted TAR archives lead to extraction of files into arbitrary filesystem locations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gradle Enterprise Test Distribution Agent | <1.3.2 | |
Gradle Maven | >=1.8<=1.8.1 | |
Gradle Test Distribution | <1.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26719 is a directory traversal vulnerability discovered in Gradle gradle-enterprise-test-distribution-agent, test-distribution-gradle-plugin, and gradle-enterprise-maven-extension.
CVE-2021-26719 has a severity rating of 6.5 (medium).
Versions before 1.3.2 of Gradle gradle-enterprise-test-distribution-agent and test-distribution-gradle-plugin, and versions before 1.8.2 of gradle-enterprise-maven-extension are affected.
A malicious actor with certain credentials can perform a registration step to exploit the vulnerability.
More information about CVE-2021-26719 can be found at the following reference link: https://security.gradle.com/advisory/CVE-2021-26719