Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-15777

EPSS 0.66% · P71
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-15777

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in the Maven Extension plugin before 1.6 for Gradle Enterprise. The extension uses a socket connection to send serialized Java objects. Deserialization is not restricted to an allow-list, thus allowing an attacker to achieve code execution via a malicious deserialization gadget chain. The socket is not bound exclusively to localhost. The port this socket is assigned to is randomly selected and is not intentionally exposed to the public (either by design or documentation). This could potentially be used to achieve remote code execution and local privilege escalation.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Gradle 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Gradle是美国Gradle公司的一套基于JVM的项目构建工具,它支持maven、Ivy仓库等。 Gradle Enterprise 1.6之前版本中存在代码问题漏洞,该漏洞源于网络系统或产品的代码开发过程中存在设计或实现不当的问题。该漏洞允许攻击者通过恶意的反序列化小部件链来实现代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-15777

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-15777

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-08-25 · 13 CVEs total

CVE-2019-14904Ansible solaris_zone模块操作系统命令注入漏洞
CVE-2020-19005zrlog 安全漏洞
CVE-2020-16197Octopus Deploy 信任管理问题漏洞
CVE-2020-24622Sonatype Nexus Repository 信息泄露漏洞
CVE-2020-16245Advantech iView 路径遍历漏洞
CVE-2020-24616FasterXML jackson-databind 代码问题漏洞
CVE-2020-14042Codiad 跨站脚本漏洞
CVE-2020-24609Savsoft Quiz 5 跨站脚本漏洞
CVE-2020-24242Netwide Assembler 安全漏洞
CVE-2020-24241Netwide Assembler 资源管理错误漏洞
CVE-2020-24240GNU Bison 资源管理错误漏洞
CVE-2020-24614Fossil 代码注入漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2020-15777

No comments yet


Leave a comment