Логотип exploitDog
bind:CVE-2020-15772
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-15772

Количество 2

Количество 2

nvd логотип

CVE-2020-15772

больше 5 лет назад

An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. When configuring Gradle Enterprise to integrate with a SAML identity provider, an XML metadata file can be uploaded by an administrator. The server side processing of this file dereferences XML External Entities (XXE), allowing a remote attacker with administrative access to perform server side request forgery.

CVSS3: 4.9
EPSS: Низкий
github логотип

GHSA-7cj4-x7wr-qf2p

больше 3 лет назад

An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. There is XXE with resultant SSRF via an uploaded SAML IDP configuration.

CVSS3: 4.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-15772

An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. When configuring Gradle Enterprise to integrate with a SAML identity provider, an XML metadata file can be uploaded by an administrator. The server side processing of this file dereferences XML External Entities (XXE), allowing a remote attacker with administrative access to perform server side request forgery.

CVSS3: 4.9
0%
Низкий
больше 5 лет назад
github логотип
GHSA-7cj4-x7wr-qf2p

An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. There is XXE with resultant SSRF via an uploaded SAML IDP configuration.

CVSS3: 4.9
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу