Bug 2219505 (CVE-2023-35946) - CVE-2023-35946 gradle: Dependency cache path traversal
Summary: CVE-2023-35946 gradle: Dependency cache path traversal
Status: NEW
Alias: CVE-2023-35946
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Nobody
QA Contact:
Depends On: 2219510
Blocks: 2219508
TreeView+ depends on / blocked
Reported: 2023-07-04 05:20 UTC by TEJ RATHI
Modified: 2023-11-15 09:45 UTC (History)
27 users (show)

Fixed In Version: Gradle 7.6.2, Gradle 8.2
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Gradle that permits directory traversal in its evaluation of repository paths. This issue could allow a local attacker to overwrite a file in the dependency cache with malicious code.
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description TEJ RATHI 2023-07-04 05:20:53 UTC
Gradle is a build tool with a focus on build automation and support for multi-language development. When Gradle writes a dependency into its dependency cache, it uses the dependency's coordinates to compute a file location. With specially crafted dependency coordinates, Gradle can be made to write files into an unintended location. The file may be written outside the dependency cache or over another file in the dependency cache. This vulnerability could be used to poison the dependency cache or overwrite important files elsewhere on the filesystem where the Gradle process has write permissions. Exploiting this vulnerability requires an attacker to have control over a dependency repository used by the Gradle build or have the ability to modify the build's configuration. It is unlikely that this would go unnoticed. A fix has been released in Gradle 7.6.2 and 8.2 to protect against this vulnerability. Gradle will refuse to cache dependencies that have path traversal elements in their dependency coordinates. It is recommended that users upgrade to a patched version. If you are unable to upgrade to Gradle 7.6.2 or 8.2, `dependency verification` will make this vulnerability more difficult to exploit.


Note You need to log in before you can comment on or make changes to this bug.