Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.googleapis.com web site.
References
Link | Resource |
---|---|
https://github.com/gradle/gradle/pull/8927 | Issue Tracking Patch |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43P7SVDJOG6OUDVFR4ZIDITZLNHPGTO/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WVXOXNLAYRGPKAZV63PYNV3HF27JW2MW/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YQ5CGOV5QVQCSPGE3WRZDKUGIXLHSZDR/ | Mailing List Third Party Advisory |
Information
Published : 2019-04-09 17:29
Updated : 2023-03-01 07:06
NVD link : CVE-2019-11065
Mitre link : CVE-2019-11065
JSON object : View
CWE
Products Affected
gradle
- gradle
fedoraproject
- fedora