First published: Wed Oct 27 2021(Updated: )
In Gradle Enterprise through 2021.3, probing of the server-side network environment can occur via an SMTP configuration test. The installation configuration user interface available to administrators allows testing the configured SMTP server settings. This test function can be used to identify the listening TCP ports available to the server, revealing information about the internal network environment.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gradle Enterprise | >=2020.4<2021.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41590 is a vulnerability in Gradle Enterprise that allows probing of the server-side network environment via an SMTP configuration test.
The CVE-2021-41590 vulnerability can be exploited by using the test function in the installation configuration user interface to identify the server's SMTP server settings.
The severity of CVE-2021-41590 is medium with a CVSS score of 5.3.
To fix CVE-2021-41590, update Gradle Enterprise to version 2021.3 or later.
More information about CVE-2021-41590 can be found at the official Gradle Enterprise security advisory page: https://security.gradle.com/advisory/2021-07.