CVE-2019-15052
Published: 14 August 2019
The HTTP client in Gradle before 5.6 sends authentication credentials originally destined for the configured host. If that host returns a 30x redirect, Gradle also sends those credentials to all subsequent hosts that the request redirects to. This is similar to CVE-2018-1000007.
Priority
CVSS 3 base score: 9.8
Status
Package | Release | Status |
---|---|---|
gradle Launchpad, Ubuntu, Debian |
bionic |
Needed
|
disco |
Ignored
(reached end-of-life)
|
|
eoan |
Ignored
(reached end-of-life)
|
|
focal |
Needed
|
|
groovy |
Ignored
(reached end-of-life)
|
|
hirsute |
Ignored
(reached end-of-life)
|
|
impish |
Needed
|
|
jammy |
Needed
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(5.6)
|
|
xenial |
Ignored
(end of standard support, was needs-triage)
|
Notes
Author | Note |
---|---|
ebarretto | According to upstream advisory a backport of the fix (still unknown) might be unfeasible. |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15052
- https://github.com/gradle/gradle/issues/10278
- https://github.com/gradle/gradle/pull/10176
- https://github.com/gradle/gradle/security/advisories/GHSA-4cwg-f7qc-6r95
- NVD
- Launchpad
- Debian