Vulnerability CVE-2020-7599


Published: 2020-03-30

Description:
All versions of com.gradle.plugin-publish before 0.11.0 are vulnerable to Insertion of Sensitive Information into Log File. When a plugin author publishes a Gradle plugin while running Gradle with the --info log level flag, the Gradle Logger logs an AWS pre-signed URL. If this build log is publicly visible (as it is in many popular public CI systems like TravisCI) this AWS pre-signed URL would allow a malicious actor to replace a recently uploaded plugin with their own.

Type:

CWE-532

(Information Exposure Through Log Files)

CVSS2 => (AV:A/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
3.3/10
2.9/10
6.5/10
Exploit range
Attack complexity
Authentication
Adjacent network
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Gradle -> Plugin publishing 

 References:
https://blog.gradle.org/plugin-portal-update
https://snyk.io/vuln/SNYK-JAVA-COMGRADLEPLUGINPUBLISH-559866

Copyright 2024, cxsecurity.com

 

Back to Top