Insertion of Sensitive Information into Log File

Affecting com.gradle.plugin-publish:com.gradle.plugin-publish.gradle.plugin artifact, versions [,0.11.0)

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

com.gradle.plugin-publish:com.gradle.plugin-publish.gradle.plugin is a plugin that publishes plugins to the Gradle Plugin Portal.

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File. When a plugin author publishes a Gradle plugin while running Gradle with the --info log level flag, the Gradle Logger logs an AWS pre-signed URL. If this build log is publicly visible (as it is in many popular public CI systems like TravisCI) this AWS pre-signed URL would allow a malicious actor to replace a recently uploaded plugin with their own. Malicious plugins can be potentially used to perform large scale supply chain attacks.

An example of this sensitive data leakage can be found here: https://travis-ci.org/nebula-plugins/nebula-kotlin-plugin/jobs/657945740#L660-L668

Remediation

Upgrade com.gradle.plugin-publish:com.gradle.plugin-publish.gradle.plugin to version 0.11.0 or higher.

References

CVSS Score

6.5
medium severity
  • Attack Vector
    Adjacent
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    None
  • Availability
    None
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Credit
Danny Thomas of Netflix
CVE
CVE-2020-7599
CWE
CWE-532
Snyk ID
SNYK-JAVA-COMGRADLEPLUGINPUBLISH-559866
Disclosed
27 Mar, 2020
Published
28 Mar, 2020