Description
All versions of com.gradle.plugin-publish before 0.11.0 are vulnerable to Insertion of Sensitive Information into Log File. When a plugin author publishes a Gradle plugin while running Gradle with the --info log level flag, the Gradle Logger logs an AWS pre-signed URL. If this build log is publicly visible (as it is in many popular public CI systems like TravisCI) this AWS pre-signed URL would allow a malicious actor to replace a recently uploaded plugin with their own.
Remediation
References
https://snyk.io/vuln/SNYK-JAVA-COMGRADLEPLUGINPUBLISH-559866
https://blog.gradle.org/plugin-portal-update
Related Vulnerabilities
CVE-2019-8331 Vulnerability in npm package bootstrap
CVE-2021-25914 Vulnerability in npm package object-collider
CVE-2020-28168 Vulnerability in maven package org.webjars.bower:axios
CVE-2022-31051 Vulnerability in npm package semantic-release
CVE-2023-34617 Vulnerability in maven package com.owlike:genson