Show filters
47 Total Results
Displaying 11-20 of 47
Sort by:
Attacker Value
Unknown

CVE-2022-30587

Disclosure Date: June 06, 2022 (last updated October 07, 2023)
Gradle Enterprise through 2022.2.2 has Incorrect Access Control that leads to information disclosure.
Attacker Value
Unknown

CVE-2022-30586

Disclosure Date: June 06, 2022 (last updated October 07, 2023)
Gradle Enterprise through 2022.2.2 has Incorrect Access Control that leads to code execution.
Attacker Value
Unknown

CVE-2022-27919

Disclosure Date: March 25, 2022 (last updated October 07, 2023)
Gradle Enterprise before 2022.1 allows remote code execution if the installation process did not specify an initial configuration file. The configuration allows certain anonymous access to administration and an API.
Attacker Value
Unknown

CVE-2022-25364

Disclosure Date: March 17, 2022 (last updated October 07, 2023)
In Gradle Enterprise before 2021.4.2, the default built-in build cache configuration allowed anonymous write access. If this was not manually changed, a malicious actor with network access to the build cache could potentially populate it with manipulated entries that execute malicious code as part of a build. As of 2021.4.2, the built-in build cache is inaccessible-by-default, requiring explicit configuration of its access-control settings before it can be used. (Remote build cache nodes are unaffected as they are inaccessible-by-default.)
Attacker Value
Unknown

CVE-2022-27225

Disclosure Date: March 16, 2022 (last updated October 07, 2023)
Gradle Enterprise before 2021.4.3 relies on cleartext data transmission in some situations. It uses Keycloak for identity management services. During the sign-in process, Keycloak sets browser cookies that effectively provide remember-me functionality. For backwards compatibility with older Safari versions, Keycloak sets a duplicate of the cookie without the Secure attribute, which allows the cookie to be sent when accessing the location that cookie is set for via HTTP. This creates the potential for an attacker (with the ability to impersonate the Gradle Enterprise host) to capture the login session of a user by having them click an http:// link to the server, despite the real server requiring HTTPS.
Attacker Value
Unknown

CVE-2022-23630

Disclosure Date: February 10, 2022 (last updated October 07, 2023)
Gradle is a build tool with a focus on build automation and support for multi-language development. In some cases, Gradle may skip that verification and accept a dependency that would otherwise fail the build as an untrusted external artifact. This occurs when dependency verification is disabled on one or more configurations and those configurations have common dependencies with other configurations that have dependency verification enabled. If the configuration that has dependency verification disabled is resolved first, Gradle does not verify the common dependencies for the configuration that has dependency verification enabled. Gradle 7.4 fixes that issue by validating artifacts at least once if they are present in a resolved configuration that has dependency verification active. For users who cannot update either do not use `ResolutionStrategy.disableDependencyVerification()` and do not use plugins that use that method to disable dependency verification for a single configuration …
Attacker Value
Unknown

CVE-2021-41619

Disclosure Date: October 27, 2021 (last updated November 28, 2024)
An issue was discovered in Gradle Enterprise before 2021.1.2. There is potential remote code execution via the application startup configuration. The installation configuration user interface (available to administrators) allows specifying arbitrary Java Virtual Machine startup options. Some of these options, such as -XX:OnOutOfMemoryError, allow specifying a command to be run on the host. This can be abused to run arbitrary commands on the host, should an attacker gain administrative access to the application.
Attacker Value
Unknown

CVE-2021-41589

Disclosure Date: October 27, 2021 (last updated November 28, 2024)
In Gradle Enterprise before 2021.3 (and Enterprise Build Cache Node before 10.0), there is potential cache poisoning and remote code execution when running the build cache node with its default configuration. This configuration allows anonymous access to the configuration user interface and anonymous write access to the build cache. If access control to the build cache is not changed from the default open configuration, a malicious actor with network access can populate the cache with manipulated entries that may execute malicious code as part of a build process. This applies to the build cache provided with Gradle Enterprise and the separate build cache node service if used. If access control to the user interface is not changed from the default open configuration, a malicious actor can undo build cache access control in order to populate the cache with manipulated entries that may execute malicious code as part of a build process. This does not apply to the build cache provided with…
Attacker Value
Unknown

CVE-2021-41590

Disclosure Date: October 27, 2021 (last updated November 28, 2024)
In Gradle Enterprise through 2021.3, probing of the server-side network environment can occur via an SMTP configuration test. The installation configuration user interface available to administrators allows testing the configured SMTP server settings. This test function can be used to identify the listening TCP ports available to the server, revealing information about the internal network environment.
Attacker Value
Unknown

CVE-2021-41586

Disclosure Date: September 24, 2021 (last updated November 28, 2024)
In Gradle Enterprise before 2021.1.3, an attacker with the ability to perform SSRF attacks can potentially reset the system user password.