Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-23630
HistoryFeb 10, 2022 - 12:00 a.m.

CVE-2022-23630

2022-02-1000:00:00
ubuntu.com
ubuntu.com
7
gradle
build automation
multi-language development
dependency verification
vulnerability
artifact validation
configuration resolution
resolutionstrategy.disabledependencyverification
gradle 7.4

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

70.6%

Gradle is a build tool with a focus on build automation and support for
multi-language development. In some cases, Gradle may skip that
verification and accept a dependency that would otherwise fail the build as
an untrusted external artifact. This occurs when dependency verification is
disabled on one or more configurations and those configurations have common
dependencies with other configurations that have dependency verification
enabled. If the configuration that has dependency verification disabled is
resolved first, Gradle does not verify the common dependencies for the
configuration that has dependency verification enabled. Gradle 7.4 fixes
that issue by validating artifacts at least once if they are present in a
resolved configuration that has dependency verification active. For users
who cannot update either do not use
ResolutionStrategy.disableDependencyVerification() and do not use plugins
that use that method to disable dependency verification for a single
configuration or make sure resolution of configuration that disable that
feature do not happen in builds that resolve configuration where the
feature is enabled.

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

70.6%