logo

CVE-2020-15777 com.gradle:gradle-enterprise-maven-extension

Package

Manager: maven
Name: com.gradle:gradle-enterprise-maven-extension
Vulnerable Version: >=0 <1.6

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00389 pctl0.59211

Details

Maven Extension plugin for Gradle Enterprise vulnerable to Deserialization of Untrusted Data An issue was discovered in the Maven Extension plugin before 1.6 for Gradle Enterprise. It is vulnerable to, in the worst case, Remote Code Execution, and in the general case, local privilege escalation. Internally, the plugin uses a socket connection to send serialized Java objects that are deserialized by a Java standard library ObjectInputStream. This ObjectInputStream was not restricted to a list of trusted classes, thus allowing an attacker to send a malicious deserialization gadget chain to achieve code execution. The socket was not bound exclusively to localhost. The port this socket is assigned to is randomly selected by the JVM and is not intentionally exposed to the public (either by design or documentation).

Metadata

Created: 2022-05-24T17:26:39Z
Modified: 2023-05-16T17:57:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vp55-fhxx-vcx8/GHSA-vp55-fhxx-vcx8.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-vp55-fhxx-vcx8
Finding: F096
Auto approve: 1