← Back to CVEs
CVE-2022-27919
CRITICAL9.8
Description
Gradle Enterprise before 2022.1 allows remote code execution if the installation process did not specify an initial configuration file. The configuration allows certain anonymous access to administration and an API.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/25/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
gradle:enterprise
Weaknesses (CWE)
CWE-276
References
https://security.gradle.com/advisory/2022-05(cve@mitre.org)
https://security.gradle.com/advisory/2022-05(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.