Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:gradle:enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F366CE-8A0B-474A-8E4D-BC8955D57994", "versionEndExcluding": "2021.4.3", "versionStartIncluding": "2020.1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Gradle Enterprise before 2021.4.3 relies on cleartext data transmission in some situations. It uses Keycloak for identity management services. During the sign-in process, Keycloak sets browser cookies that effectively provide remember-me functionality. For backwards compatibility with older Safari versions, Keycloak sets a duplicate of the cookie without the Secure attribute, which allows the cookie to be sent when accessing the location that cookie is set for via HTTP. This creates the potential for an attacker (with the ability to impersonate the Gradle Enterprise host) to capture the login session of a user by having them click an http:// link to the server, despite the real server requiring HTTPS."}, {"lang": "es", "value": "Gradle Enterprise versiones anteriores a 2021.4.3, es basado en la transmisi\u00f3n de datos en texto sin cifrar en algunas situaciones. Usa Keycloak para los servicios de administraci\u00f3n de la identidad. Durante el proceso de inicio de sesi\u00f3n, Keycloak establece cookies del navegador que proporcionan efectivamente la funcionalidad \"remember-me\". Para la compatibilidad con versiones anteriores de Safari, Keycloak establece un duplicado de la cookie sin el atributo Secure, lo que permite que la cookie sea enviada cuando es accedida a la ubicaci\u00f3n para la que sea establecida la cookie por medio de HTTP. Esto crea la posibilidad de que un atacante (con la capacidad de hacerse pasar por el host de Gradle Enterprise) capture la sesi\u00f3n de inicio de sesi\u00f3n de un usuario haciendo que haga clic en un enlace http:// al servidor, a pesar de que el servidor real requiere HTTPS"}], "id": "CVE-2022-27225", "lastModified": "2024-11-21T06:55:26.773", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-03-16T01:15:08.047", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://security.gradle.com/advisory/2022-03"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://security.gradle.com/advisory/2022-03"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-311"}], "source": "nvd@nist.gov", "type": "Primary"}]}