An issue was discovered in Gradle Enterprise 2018.2 - 2020.2.4. The CSRF prevention token is stored in a request cookie that is not annotated as HttpOnly. An attacker with the ability to execute arbitrary code in a user's browser could impose an arbitrary value for this token, allowing them to perform cross-site request forgery.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://github.com/gradle/gradle/security/advisories | third party advisory |
https://security.gradle.com/advisory/CVE-2020-15776 | vendor advisory |
https://cwe.mitre.org/data/definitions/1004.html | third party advisory |