First published: Tue Jan 09 2024(Updated: )
In Gradle Enterprise before 2023.1, a remote attacker may be able to gain access to a new installation (in certain installation scenarios) because of a non-unique initial system user password. Although this password must be changed upon the first login, it is possible that an attacker logs in before the legitimate administrator logs in.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gradle Enterprise | <2023.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-49238 is considered to be high due to its potential for unauthorized access.
To fix CVE-2023-49238, ensure that the default initial system user password is changed immediately upon installation.
CVE-2023-49238 affects Gradle Enterprise versions prior to 2023.1.
Yes, CVE-2023-49238 can be exploited remotely by an attacker if they gain access before the initial password is changed.
The primary workaround for CVE-2023-49238 is to configure the system securely and enforce password changes immediately after installation.