An issue was discovered in Gradle Enterprise 2018.2 - 2020.2.4. The CSRF prevention token is stored in a request cookie that is not annotated as HttpOnly. An attacker with the ability to execute arbitrary code in a user's browser could impose an arbitrary value for this token, allowing them to perform cross-site request forgery.
References
Link | Resource |
---|---|
https://cwe.mitre.org/data/definitions/1004.html | Third Party Advisory |
https://github.com/gradle/gradle/security/advisories | Third Party Advisory |
https://security.gradle.com/advisory/CVE-2020-15776 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-09-18T13:16:05
Updated: 2022-07-10T20:16:19
Reserved: 2020-07-15T00:00:00
Link: CVE-2020-15776
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-09-18T14:15:12.557
Modified: 2022-09-30T03:39:31.617
Link: CVE-2020-15776
JSON object: View
Redhat Information
No data.
CWE