Description
Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.googleapis.com web site.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4803 | Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.googleapis.com web site. |
Github GHSA |
GHSA-pprq-4488-wgqx | Insecure transport protocol in Gradle |
Ubuntu USN |
USN-4858-1 | Gradle vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:40:16.302Z
Reserved: 2019-04-09T00:00:00.000Z
Link: CVE-2019-11065
No data.
Status : Modified
Published: 2019-04-10T00:29:00.243
Modified: 2024-11-21T04:20:28.197
Link: CVE-2019-11065
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA
Ubuntu USN