6.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
0.0004 Low
EPSS
Percentile
15.7%
Gradle is a build tool with a focus on build automation and support for
multi-language development. When copying or archiving symlinked files,
Gradle resolves them but applies the permissions of the symlink itself
instead of the permissions of the linked file to the resulting file. This
leads to files having too much permissions given that symlinks usually are
world readable and writeable. While it is unlikely this results in a direct
vulnerability for the impacted build, it may open up attack vectors
depending on where build artifacts end up being copied to or un-archived.
In versions 7.6.3, 8.4 and above, Gradle will now properly use the
permissions of the file pointed at by the symlink to set permissions of the
copied or archived file.
github.com/gradle/gradle/commit/3b406191e24d69e7e42dc3f3b5cc50625aa930b7
github.com/gradle/gradle/releases/tag/v7.6.3
github.com/gradle/gradle/releases/tag/v8.4.0
github.com/gradle/gradle/security/advisories/GHSA-43r3-pqhv-f7h9
launchpad.net/bugs/cve/CVE-2023-44387
nvd.nist.gov/vuln/detail/CVE-2023-44387
security-tracker.debian.org/tracker/CVE-2023-44387
www.cve.org/CVERecord?id=CVE-2023-44387