Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2021-29428 First vendor Publication 2021-04-13
Vendor Cve Last vendor Modification 2021-10-20

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 4.4 Attack Range Local
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

In Gradle before version 7.0, on Unix-like systems, the system temporary directory can be created with open permissions that allow multiple users to create and delete files within it. Gradle builds could be vulnerable to a local privilege escalation from an attacker quickly deleting and recreating files in the system temporary directory. This vulnerability impacted builds using precompiled script plugins written in Kotlin DSL and tests for Gradle plugins written using ProjectBuilder or TestKit. If you are on Windows or modern versions of macOS, you are not vulnerable. If you are on a Unix-like operating system with the "sticky" bit set on your system temporary directory, you are not vulnerable. The problem has been patched and released with Gradle 7.0. As a workaround, on Unix-like operating systems, ensure that the "sticky" bit is set. This only allows the original user (or root) to delete a file. If you are unable to change the permissions of the system temporary directory, you can move the Java temporary directory by setting the System Property `java.io.tmpdir`. The new path needs to limit permissions to the build user only. For additional details refer to the referenced GitHub Security Advisory.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29428

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-379 Creation of Temporary File in Directory with Incorrect Permissions (CWE/SANS Top 25)
50 % CWE-378 Creation of Temporary File With Insecure Permissions (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3
Application 2

Sources (Detail)

Source Url
CONFIRM https://github.com/gradle/gradle/security/advisories/GHSA-89qm-pxvm-p336
MISC https://docs.gradle.org/7.0/release-notes.html#security-advisories
https://github.com/gradle/gradle/pull/15240
https://github.com/gradle/gradle/pull/15654

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2021-10-20 21:23:13
  • Multiple Updates
2021-09-30 01:46:05
  • Multiple Updates
2021-05-04 14:09:53
  • Multiple Updates
2021-04-22 21:23:08
  • Multiple Updates
2021-04-14 05:23:04
  • First insertion