In Gradle Enterprise before 2023.1, a remote attacker may be able to gain access to a new installation (in certain installation scenarios) because of a non-unique initial system user password. Although this password must be changed upon the first login, it is possible that an attacker logs in before the legitimate administrator logs in.
References
| Link | Resource |
|---|---|
| https://security.gradle.com | Vendor Advisory |
| https://security.gradle.com/advisory/2023-01 | Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20240216-0003/ |
Configurations
History
16 Feb 2024, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
16 Jan 2024, 15:24
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | () https://security.gradle.com - Vendor Advisory | |
| References | () https://security.gradle.com/advisory/2023-01 - Vendor Advisory | |
| CWE | CWE-521 | |
| CPE | cpe:2.3:a:gradle:enterprise:*:*:*:*:*:*:*:* | |
| First Time |
Gradle enterprise
Gradle |
Information
Published : 2024-01-09 02:15
Updated : 2024-02-16 13:15
NVD link : CVE-2023-49238
Mitre link : CVE-2023-49238
CVE.ORG link : CVE-2023-49238
JSON object : View
Products Affected
gradle
- enterprise
CWE
CWE-521
Weak Password Requirements
