First published: Fri Sep 24 2021(Updated: )
In Gradle Enterprise before 2021.1.3, a crafted request can trigger deserialization of arbitrary unsafe Java objects. The attacker must have the encryption and signing keys.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gradle Gradle | >=2017.2<2021.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41588 is a vulnerability in Gradle Enterprise before 2021.1.3 that allows a crafted request to trigger deserialization of arbitrary unsafe Java objects.
CVE-2021-41588 has a severity rating of 8.1 (High).
CVE-2021-41588 affects Gradle Enterprise versions before 2021.1.3.
Gradle Enterprise versions between 2017.2 and 2021.1.2 are affected by CVE-2021-41588.
Yes, the attacker must have the encryption and signing keys to exploit CVE-2021-41588.