CVE-2020-15768
moderate-risk
Published 2020-09-18
An issue was discovered in Gradle Enterprise 2017.3 - 2020.2.4 and Gradle Enterprise Build Cache Node 1.0 - 9.2. Unrestricted HTTP header reflection in Gradle Enterprise allows remote attackers to obtain authentication cookies, if they are able to discover a separate XSS vulnerability. This potentially allows an attacker to impersonate another user. Gradle Enterprise affected application request paths:/info/headers, /cache-info/headers, /admin-info/headers, /distribution-broker-info/headers. Gradle Enterprise Build Cache Node affected application request paths:/cache-node-info/headers.
Do I need to act?
-
0.51% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (2)
Enterprise Cache Node
Affected Vendors
References (4)
Third Party Advisory
https://github.com/gradle/gradle/security/advisories
Vendor Advisory
https://security.gradle.com/advisory/CVE-2020-15768
Third Party Advisory
https://github.com/gradle/gradle/security/advisories
Vendor Advisory
https://security.gradle.com/advisory/CVE-2020-15768
35
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
2/34 · Minimal
Exposure
7/34 · Low