Description
Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.googleapis.com web site.
Published: 2019-04-09
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-4803 Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.googleapis.com web site.
Github GHSA Github GHSA GHSA-pprq-4488-wgqx Insecure transport protocol in Gradle
Ubuntu USN Ubuntu USN USN-4858-1 Gradle vulnerabilities
History

No history.

Subscriptions

Fedoraproject Fedora
Gradle Gradle
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T22:40:16.302Z

Reserved: 2019-04-09T00:00:00.000Z

Link: CVE-2019-11065

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-04-10T00:29:00.243

Modified: 2024-11-21T04:20:28.197

Link: CVE-2019-11065

cve-icon Redhat

Severity : Important

Publid Date: 2019-04-09T00:00:00Z

Links: CVE-2019-11065 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses