Vulnerability Description
An issue was discovered in Gradle Enterprise 2017.3 - 2020.2.4 and Gradle Enterprise Build Cache Node 1.0 - 9.2. Unrestricted HTTP header reflection in Gradle Enterprise allows remote attackers to obtain authentication cookies, if they are able to discover a separate XSS vulnerability. This potentially allows an attacker to impersonate another user. Gradle Enterprise affected application request paths:/info/headers, /cache-info/headers, /admin-info/headers, /distribution-broker-info/headers. Gradle Enterprise Build Cache Node affected application request paths:/cache-node-info/headers.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gradle | Enterprise | >= 2017.3, <= 2020.2.4 |
| Gradle | Enterprise Cache Node | >= 1.0, <= 9.2 |
References
- https://github.com/gradle/gradle/security/advisoriesThird Party Advisory
- https://security.gradle.com/advisory/CVE-2020-15768Vendor Advisory
- https://github.com/gradle/gradle/security/advisoriesThird Party Advisory
- https://security.gradle.com/advisory/CVE-2020-15768Vendor Advisory
FAQ
What is CVE-2020-15768?
CVE-2020-15768 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in Gradle Enterprise 2017.3 - 2020.2.4 and Gradle Enterprise Build Cache Node 1.0 - 9.2. Unrestricted HTTP header reflection in Gradle Enterprise allows remote attackers to obt...
How severe is CVE-2020-15768?
CVE-2020-15768 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-15768?
Check the references section above for vendor advisories and patch information. Affected products include: Gradle Enterprise, Gradle Enterprise Cache Node.