Page 2 of 15 results (0.005 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Gradle Enterprise before 2020.2.5. The cookie used to convey the CSRF prevention token is not annotated with the “secure” attribute, which allows an attacker with the ability to MITM plain HTTP requests to obtain it, if the user mistakenly uses a HTTP instead of HTTPS address to access the server. This cookie value could then be used to perform CSRF. Se detectó un problema en Gradle Enterprise versiones anteriores a 2020.2.5. La cookie utilizada para transmitir el token de prevención del CSRF no está anotada con el atributo "seguro", lo que permite a un atacante con capacidad de MITM peticiones HTTP simples obtenerlo, si el usuario utiliza por error una dirección HTTP en lugar de HTTPS para acceder al servidor. • https://github.com/gradle/gradle/security/advisories https://security.gradle.com/advisory/CVE-2020-15767 • CWE-311: Missing Encryption of Sensitive Data •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Gradle Enterprise 2018.5. An attacker can potentially make repeated attempts to guess a local user's password, due to lack of lock-out after excessive failed logins. Se detectó un problema en Gradle Enterprise versión 2018.5. Un atacante puede hacer repetidos intentos de adivinar la contraseña de un usuario local, debido a la falta de bloqueo después de excesivos inicios de sesión fallidos • https://github.com/gradle/gradle/security/advisories https://security.gradle.com/advisory/CVE-2020-15770 • CWE-307: Improper Restriction of Excessive Authentication Attempts •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. When configuring Gradle Enterprise to integrate with a SAML identity provider, an XML metadata file can be uploaded by an administrator. The server side processing of this file dereferences XML External Entities (XXE), allowing a remote attacker with administrative access to perform server side request forgery. Se detectó un problema en Gradle Enterprise versiones 2018.5 - 2020.2.4. Al configurar Gradle Enterprise para integrarse con un proveedor de identidad SAML, un archivo de metadatos XML puede ser cargado por un administrador. • https://github.com/gradle/gradle/security/advisories https://security.gradle.com/advisory/CVE-2020-15772 • CWE-611: Improper Restriction of XML External Entity Reference CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. An attacker with physical access to the browser of a user who has recently logged in to Gradle Enterprise and since closed their browser could reopen their browser to access Gradle Enterprise as that user. Se detectó un problema en Gradle Enterprise versiones 2018.5 - 2020.2.4. Un atacante con acceso físico al navegador de un usuario que se ha conectado recientemente a Gradle Enterprise y que desde entonces ha cerrado su navegador podría reabrirlo para acceder a Gradle Enterprise como ese usuario • https://github.com/gradle/gradle/security/advisories https://security.gradle.com/advisory/CVE-2020-15774 • CWE-613: Insufficient Session Expiration •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Gradle Enterprise 2017.1 - 2020.2.4. The /usage page of Gradle Enterprise conveys high level build information such as project names and build counts over time. This page is incorrectly viewable anonymously. Se detectó un problema en Gradle Enterprise versiones 2017.1 - 2020.2.4. La página de uso de Gradle Enterprise transmite información de alto nivel como nombres de proyectos y recuentos de construcción a lo largo del tiempo. • https://github.com/gradle/gradle/security/advisories https://security.gradle.com/advisory/CVE-2020-15775 • CWE-922: Insecure Storage of Sensitive Information •