Description
All versions of com.gradle.plugin-publish before 0.11.0 are vulnerable to Insertion of Sensitive Information into Log File. When a plugin author publishes a Gradle plugin while running Gradle with the --info log level flag, the Gradle Logger logs an AWS pre-signed URL. If this build log is publicly visible (as it is in many popular public CI systems like TravisCI) this AWS pre-signed URL would allow a malicious actor to replace a recently uploaded plugin with their own.
Published: 2020-03-30
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-3634 All versions of com.gradle.plugin-publish before 0.11.0 are vulnerable to Insertion of Sensitive Information into Log File. When a plugin author publishes a Gradle plugin while running Gradle with the --info log level flag, the Gradle Logger logs an AWS pre-signed URL. If this build log is publicly visible (as it is in many popular public CI systems like TravisCI) this AWS pre-signed URL would allow a malicious actor to replace a recently uploaded plugin with their own.
Github GHSA Github GHSA GHSA-cv78-v957-jx34 Exposure of Sensitive Information in Gradle publish plugin
History

No history.

Subscriptions

Gradle Plugin Publishing
cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-08-04T09:33:19.912Z

Reserved: 2020-01-21T00:00:00.000Z

Link: CVE-2020-7599

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-03-30T19:15:17.467

Modified: 2024-11-21T05:37:27.023

Link: CVE-2020-7599

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses