CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
70.6%
Gradle is a build tool with a focus on build automation and support for
multi-language development. In some cases, Gradle may skip that
verification and accept a dependency that would otherwise fail the build as
an untrusted external artifact. This occurs when dependency verification is
disabled on one or more configurations and those configurations have common
dependencies with other configurations that have dependency verification
enabled. If the configuration that has dependency verification disabled is
resolved first, Gradle does not verify the common dependencies for the
configuration that has dependency verification enabled. Gradle 7.4 fixes
that issue by validating artifacts at least once if they are present in a
resolved configuration that has dependency verification active. For users
who cannot update either do not use
ResolutionStrategy.disableDependencyVerification()
and do not use plugins
that use that method to disable dependency verification for a single
configuration or make sure resolution of configuration that disable that
feature do not happen in builds that resolve configuration where the
feature is enabled.
docs.gradle.org/7.4/release-notes.html
github.com/gradle/gradle/commit/88ab9b652933bc3b2e3161b31ad8b8f4f0516351
github.com/gradle/gradle/security/advisories/GHSA-9pf5-88jw-3qgr
launchpad.net/bugs/cve/CVE-2022-23630
nvd.nist.gov/vuln/detail/CVE-2022-23630
security-tracker.debian.org/tracker/CVE-2022-23630
www.cve.org/CVERecord?id=CVE-2022-23630
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
70.6%