In Gradle Enterprise before 2023.1, a remote attacker may be able to gain access to a new installation (in certain installation scenarios) because of a non-unique initial system user password. Although this password must be changed upon the first login, it is possible that an attacker logs in before the legitimate administrator logs in.
References
| Link | Resource |
|---|---|
| https://security.gradle.com | Vendor Advisory |
| https://security.gradle.com/advisory/2023-01 | Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20240216-0003/ | |
| https://security.gradle.com | Vendor Advisory |
| https://security.gradle.com/advisory/2023-01 | Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20240216-0003/ |
Configurations
History
No history.
Information
Published : 2024-01-09 02:15
Updated : 2025-06-17 16:15
NVD link : CVE-2023-49238
Mitre link : CVE-2023-49238
CVE.ORG link : CVE-2023-49238
JSON object : View
Products Affected
gradle
- enterprise
CWE
CWE-521
Weak Password Requirements
