CVE-2021-41588
- EPSS 0.19%
- Veröffentlicht 24.09.2021 15:15:08
- Zuletzt bearbeitet 21.11.2024 06:26:28
In Gradle Enterprise before 2021.1.3, a crafted request can trigger deserialization of arbitrary unsafe Java objects. The attacker must have the encryption and signing keys.
CVE-2021-41586
- EPSS 0.2%
- Veröffentlicht 24.09.2021 15:15:08
- Zuletzt bearbeitet 21.11.2024 06:26:28
In Gradle Enterprise before 2021.1.3, an attacker with the ability to perform SSRF attacks can potentially reset the system user password.
CVE-2021-41584
- EPSS 0.51%
- Veröffentlicht 24.09.2021 03:15:06
- Zuletzt bearbeitet 21.11.2024 06:26:28
Gradle Enterprise before 2021.1.3 can allow unauthorized viewing of a response (information disclosure of possibly sensitive build/configuration details) via a crafted HTTP request with the X-Gradle-Enterprise-Ajax-Request header.
CVE-2021-32751
- EPSS 0.26%
- Veröffentlicht 20.07.2021 23:15:37
- Zuletzt bearbeitet 21.11.2024 06:07:40
Gradle is a build tool with a focus on build automation. In versions prior to 7.2, start scripts generated by the `application` plugin and the `gradlew` script are both vulnerable to arbitrary code execution when an attacker is able to change environ...
CVE-2021-29428
- EPSS 0.06%
- Veröffentlicht 13.04.2021 20:15:21
- Zuletzt bearbeitet 21.11.2024 06:01:04
In Gradle before version 7.0, on Unix-like systems, the system temporary directory can be created with open permissions that allow multiple users to create and delete files within it. Gradle builds could be vulnerable to a local privilege escalation ...
CVE-2021-29427
- EPSS 0.56%
- Veröffentlicht 13.04.2021 20:15:21
- Zuletzt bearbeitet 21.11.2024 06:01:04
In Gradle from version 5.1 and before version 7.0 there is a vulnerability which can lead to information disclosure and/or dependency poisoning. Repository content filtering is a security control Gradle introduced to help users specify what repositor...
CVE-2021-29429
- EPSS 0.04%
- Veröffentlicht 12.04.2021 22:15:13
- Zuletzt bearbeitet 21.11.2024 06:01:04
In Gradle before version 7.0, files created with open permissions in the system temporary directory can allow an attacker to access information downloaded by Gradle. Some builds could be vulnerable to a local information disclosure. Remote files acce...
CVE-2020-11979
- EPSS 0.61%
- Veröffentlicht 01.10.2020 20:15:13
- Zuletzt bearbeitet 21.11.2024 04:59:02
As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without ...
CVE-2019-16370
- EPSS 0.16%
- Veröffentlicht 16.09.2019 18:15:12
- Zuletzt bearbeitet 21.11.2024 04:30:35
The PGP signing plugin in Gradle before 6.0 relies on the SHA-1 algorithm, which might allow an attacker to replace an artifact with a different one that has the same SHA-1 message digest, a related issue to CVE-2005-4900.
CVE-2019-15052
- EPSS 0.24%
- Veröffentlicht 14.08.2019 20:15:11
- Zuletzt bearbeitet 21.11.2024 04:27:57
The HTTP client in Gradle before 5.6 sends authentication credentials originally destined for the configured host. If that host returns a 30x redirect, Gradle also sends those credentials to all subsequent hosts that the request redirects to. This is...