GHSA-cv78-v957-jx34

Suggest an improvement
Source
https://github.com/advisories/GHSA-cv78-v957-jx34
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-cv78-v957-jx34/GHSA-cv78-v957-jx34.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-cv78-v957-jx34
Aliases
  • CVE-2020-7599
Published
2022-05-24T17:12:57Z
Modified
2023-11-08T04:03:59.695365Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Exposure of Sensitive Information in Gradle publish plugin
Details

All versions of com.gradle.plugin-publish before 0.11.0 are vulnerable to Insertion of Sensitive Information into Log File. When a plugin author publishes a Gradle plugin while running Gradle with the --info log level flag, the Gradle Logger logs an AWS pre-signed URL. If this build log is publicly visible (as it is in many popular public CI systems like TravisCI) this AWS pre-signed URL would allow a malicious actor to replace a recently uploaded plugin with their own.

Database specific
{
    "nvd_published_at": "2020-03-30T19:15:00Z",
    "github_reviewed_at": "2022-07-27T22:17:45Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-532"
    ]
}
References

Affected packages

Maven / com.gradle.publish:plugin-publish-plugin

Package

Name
com.gradle.publish:plugin-publish-plugin
View open source insights on deps.dev
Purl
pkg:maven/com.gradle.publish/plugin-publish-plugin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.11.0

Maven / com.gradle.plugin-publish:com.gradle.plugin-publish.gradle.plugin

Package

Name
com.gradle.plugin-publish:com.gradle.plugin-publish.gradle.plugin
View open source insights on deps.dev
Purl
pkg:maven/com.gradle.plugin-publish/com.gradle.plugin-publish.gradle.plugin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.11.0