A directory traversal issue was discovered in Gradle gradle-enterprise-test-distribution-agent before 1.3.2, test-distribution-gradle-plugin before 1.3.2, and gradle-enterprise-maven-extension before 1.8.2. A malicious actor (with certain credentials) can perform a registration step such that crafted TAR archives lead to extraction of files into arbitrary filesystem locations.
References
Link | Resource |
---|---|
https://security.gradle.com/advisory/CVE-2021-26719 | Vendor Advisory |
https://security.gradle.com/advisory/CVE-2021-26719 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.gradle.com/advisory/CVE-2021-26719 - Vendor Advisory |
Information
Published : 2021-02-09 14:15
Updated : 2024-11-21 05:56
NVD link : CVE-2021-26719
Mitre link : CVE-2021-26719
CVE.ORG link : CVE-2021-26719
JSON object : View
Products Affected
gradle
- enterprise_test_distribution_agent
- test_distribution
- maven
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')