| ID |
CVE-2020-7599
|
| Sažetak |
All versions of com.gradle.plugin-publish before 0.11.0 are vulnerable to Insertion of Sensitive Information into Log File. When a plugin author publishes a Gradle plugin while running Gradle with the --info log level flag, the Gradle Logger logs an AWS pre-signed URL. If this build log is publicly visible (as it is in many popular public CI systems like TravisCI) this AWS pre-signed URL would allow a malicious actor to replace a recently uploaded plugin with their own. |
| Reference |
|
| CVSS |
| Base: | 3.3 |
| Impact: | 2.9 |
| Exploitability: | 6.5 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| ADJACENT_NETWORK |
LOW |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| PARTIAL |
NONE |
NONE |
|
| CVSS vektor |
AV:A/AC:L/Au:N/C:P/I:N/A:N |
| Zadnje važnije ažuriranje |
02-04-2020 - 14:48 |
| Objavljeno |
30-03-2020 - 19:15 |