4.3
CVSSv2

CVE-2022-27225

Published: 16/03/2022 Updated: 22/03/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Gradle Enterprise prior to 2021.4.3 relies on cleartext data transmission in some situations. It uses Keycloak for identity management services. During the sign-in process, Keycloak sets browser cookies that effectively provide remember-me functionality. For backwards compatibility with older Safari versions, Keycloak sets a duplicate of the cookie without the Secure attribute, which allows the cookie to be sent when accessing the location that cookie is set for via HTTP. This creates the potential for an attacker (with the ability to impersonate the Gradle Enterprise host) to capture the login session of a user by having them click an link to the server, despite the real server requiring HTTPS.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gradle enterprise

Github Repositories

A frontend for exploring CVE data in the EPSS Model.

EPSS Browser "The EPSS (Exploit Prediction Scoring System) Model is an open, data-driven effort for estimating the likelihood (probability) that a software vulnerability will be exploited in the wild" Traditionally, security teams spend a lot of time reporting and acting on CVSS scores for specific CVEs Disclosing these vulnerabilities is important, and scoring thei

PainKiller Security Tools

PainKiller Security Tools This repo contains a Power Command Console project that combines CycloneDX and Dependency Track to let you create SBOM files from git repos and import them in to OWASP Dependency Track which gives you a nice GUI where you can analyze your repos vulnerabilities There is also a command to get a Exploit Prediction score (EPSS) with a CVE as input That