Bug 1212930 (CVE-2023-35946) - VUL-0: CVE-2023-35946: gradle: dependency cache writes files into an unintended location
Summary: VUL-0: CVE-2023-35946: gradle: dependency cache writes files into an unintend...
Status: NEW
Alias: CVE-2023-35946
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Gus Kenion
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/371010/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-35946:6.9:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-07-03 06:09 UTC by Alexander Bergmann
Modified: 2023-11-06 04:48 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---
stoyan.manolov: needinfo? (gus.kenion)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2023-07-03 06:09:18 UTC
CVE-2023-35946

Gradle is a build tool with a focus on build automation and support for
multi-language development. When Gradle writes a dependency into its dependency
cache, it uses the dependency's coordinates to compute a file location. With
specially crafted dependency coordinates, Gradle can be made to write files into
an unintended location. The file may be written outside the dependency cache or
over another file in the dependency cache. This vulnerability could be used to
poison the dependency cache or overwrite important files elsewhere on the
filesystem where the Gradle process has write permissions. Exploiting this
vulnerability requires an attacker to have control over a dependency repository
used by the Gradle build or have the ability to modify the build's
configuration. It is unlikely that this would go unnoticed. A fix has been
released in Gradle 7.6.2 and 8.2 to protect against this vulnerability. Gradle
will refuse to cache dependencies that have path traversal elements in their
dependency coordinates. It is recommended that users upgrade to a patched
version. If you are unable to upgrade to Gradle 7.6.2 or 8.2, `dependency
verification` will make this vulnerability more difficult to exploit.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-35946
https://www.cve.org/CVERecord?id=CVE-2023-35946
https://docs.gradle.org/current/userguide/dependency_verification.html
https://github.com/gradle/gradle/commit/859eae2b2acf751ae7db3c9ffefe275aa5da0d5d
https://github.com/gradle/gradle/commit/b07e528feb3a5ffa66bdcc358549edd73e4c8a12
https://github.com/gradle/gradle/security/advisories/GHSA-2h6c-rv6q-494v