An issue was discovered in Gradle Enterprise before 2021.1.2. There is potential remote code execution via the application startup configuration. The installation configuration user interface (available to administrators) allows specifying arbitrary Java Virtual Machine startup options. Some of these options, such as -XX:OnOutOfMemoryError, allow specifying a command to be run on the host. This can be abused to run arbitrary commands on the host, should an attacker gain administrative access to the application.
References
Link | Resource |
---|---|
https://security.gradle.com | Vendor Advisory |
https://security.gradle.com/advisory/2021-08 | Vendor Advisory |
Configurations
History
03 Nov 2021, 12:56
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://security.gradle.com - Vendor Advisory | |
References | (MISC) https://security.gradle.com/advisory/2021-08 - Vendor Advisory | |
CPE | cpe:2.3:a:gradle:enterprise:*:*:*:*:*:*:*:* | |
CWE | CWE-94 | |
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 7.2 |
27 Oct 2021, 14:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-27 14:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-41619
Mitre link : CVE-2021-41619
CVE.ORG link : CVE-2021-41619
JSON object : View
Products Affected
gradle
- enterprise
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')