Vulnerability Name: | CVE-2022-41574 (CCN-238059) | ||||||||||||
Assigned: | 2022-10-04 | ||||||||||||
Published: | 2022-10-04 | ||||||||||||
Updated: | 2022-10-11 | ||||||||||||
Summary: | An access-control vulnerability in Gradle Enterprise 2022.4 through 2022.3.1 allows remote attackers to prevent backups from occurring, and send emails with arbitrary text content to the configured installation-administrator contact address, via HTTP access to an accidentally exposed internal endpoint. This is fixed in 2022.3.2. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 8.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:C/A:P)
| ||||||||||||
Vulnerability Type: | CWE-863 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-41574 Source: XF Type: UNKNOWN gradle-cve202241574-sec-bypass(238059) Source: MISC Type: Vendor Advisory https://security.gradle.com Source: CCN Type: Gradle Security Advisory 2022-12 Unrestricted access to application HTTP endpoint allows arbitrarily emailing installation admin contact and preventing backups Source: MISC Type: Mitigation, Vendor Advisory https://security.gradle.com/advisory/2022-12 | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
BACK |