CVE-2020-15767

An issue was discovered in Gradle Enterprise before 2020.2.5. The cookie used to convey the CSRF prevention token is not annotated with the “secure” attribute, which allows an attacker with the ability to MITM plain HTTP requests to obtain it, if the user mistakenly uses a HTTP instead of HTTPS address to access the server. This cookie value could then be used to perform CSRF.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gradle:enterprise:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:06

Type Values Removed Values Added
References () https://github.com/gradle/gradle/security/advisories - Third Party Advisory () https://github.com/gradle/gradle/security/advisories - Third Party Advisory
References () https://security.gradle.com/advisory/CVE-2020-15767 - Vendor Advisory () https://security.gradle.com/advisory/CVE-2020-15767 - Vendor Advisory

Information

Published : 2020-09-18 14:15

Updated : 2024-11-21 05:06


NVD link : CVE-2020-15767

Mitre link : CVE-2020-15767

CVE.ORG link : CVE-2020-15767


JSON object : View

Products Affected

gradle

  • enterprise
CWE
CWE-311

Missing Encryption of Sensitive Data