{"uuid": "b0baf083-2a27-499d-af6e-ca75cadc19a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26053", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6625", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-26053\n\ud83d\udd25 CVSS Score: 6.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Gradle is a build tool with a focus on build automation and support for multi-language development. This is a collision attack on long IDs (64bits) for PGP keys. Users of dependency verification in Gradle are vulnerable if they use long IDs for PGP keys in a `trusted-key` or `pgp` element in their dependency verification metadata file. The fix is to fail dependency verification if anything but a fingerprint is used in a trust element in dependency verification metadata. The problem is fixed in Gradle 8.0 and above. The problem is also patched in Gradle 6.9.4 and 7.6.1. As a workaround, use only full fingerprint IDs for `trusted-key` or `pgp` element in the metadata is a protection against this issue.\n\ud83d\udccf Published: 2023-03-02T03:11:31.488Z\n\ud83d\udccf Modified: 2025-03-05T21:15:36.343Z\n\ud83d\udd17 References:\n1. https://github.com/gradle/gradle/security/advisories/GHSA-c724-3xg7-g3hf\n2. https://github.com/gradle/gradle/commit/bf3cc0f2b463033037e67aaacda31291643ea1a9\n3. https://security.netapp.com/advisory/ntap-20230413-0002/", "creation_timestamp": "2025-03-05T21:35:05.000000Z"}