CSRF Vulnerability in Gradle Enterprise by Gradle
CVE-2020-15767

5.3MEDIUM

Key Information:

Vendor

Gradle

Vendor
CVE Published:
18 September 2020

What is CVE-2020-15767?

A security flaw exists in Gradle Enterprise versions before 2020.2.5, where the cookie managing the CSRF prevention token does not use the 'secure' attribute. This oversight allows attackers capable of executing Man-In-The-Middle (MITM) attacks on non-secure HTTP connections to intercept the token. If the user accesses the Gradle Enterprise server over HTTP instead of HTTPS inadvertently, the attacker can capture the token and leverage it to execute unauthorized actions on behalf of the user.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.