In Gradle Enterprise before 2023.1, a remote attacker may be able to gain access to a new installation (in certain installation scenarios) because of a non-unique initial system user password. Although this password must be changed upon the first login, it is possible that an attacker logs in before the legitimate administrator logs in.
References
| Link | Resource |
|---|---|
| https://security.gradle.com | Vendor Advisory |
| https://security.gradle.com/advisory/2023-01 | Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20240216-0003/ | |
| https://security.gradle.com | Vendor Advisory |
| https://security.gradle.com/advisory/2023-01 | Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20240216-0003/ |
Configurations
History
21 Nov 2024, 08:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://security.gradle.com - Vendor Advisory | |
| References | () https://security.gradle.com/advisory/2023-01 - Vendor Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20240216-0003/ - |
16 Feb 2024, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
16 Jan 2024, 15:24
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-09 02:15
Updated : 2025-06-17 16:15
NVD link : CVE-2023-49238
Mitre link : CVE-2023-49238
CVE.ORG link : CVE-2023-49238
JSON object : View
Products Affected
gradle
- enterprise
CWE
CWE-521
Weak Password Requirements
