First published: Thu Mar 17 2022(Updated: )
In Gradle Enterprise before 2021.4.2, the default built-in build cache configuration allowed anonymous write access. If this was not manually changed, a malicious actor with network access to the build cache could potentially populate it with manipulated entries that execute malicious code as part of a build. As of 2021.4.2, the built-in build cache is inaccessible-by-default, requiring explicit configuration of its access-control settings before it can be used. (Remote build cache nodes are unaffected as they are inaccessible-by-default.)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gradle Enterprise | <2021.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25364 is a vulnerability in Gradle Enterprise before version 2021.4.2 that allows anonymous write access to the default built-in build cache configuration.
A malicious actor with network access to the build cache could potentially populate it with manipulated entries that execute malicious code as part of the build process.
If your Gradle Enterprise version is before 2021.4.2, it is affected by CVE-2022-25364.
Yes, the fix for CVE-2022-25364 is included in version 2021.4.2 of Gradle Enterprise.
CVE-2022-25364 has a severity rating of 8.1, which is categorized as critical.