Session Hijacking Vulnerability in Gradle Enterprise by Gradle
CVE-2020-15774

6.8MEDIUM

Key Information:

Vendor

Gradle

Vendor
CVE Published:
18 September 2020

What is CVE-2020-15774?

A session hijacking vulnerability exists in Gradle Enterprise versions 2018.5 through 2020.2.4. This security flaw allows an attacker with physical access to a user's browser to exploit a session that has not been completely terminated. If a user has logged in to Gradle Enterprise and then closed the browser, an attacker can reopen the browser to gain unauthorized access as that user. This poses a significant risk, as sensitive data and operations could potentially be compromised.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

CVSS V3.1

Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Physical
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.