CVE-2021-41619

An issue was discovered in Gradle Enterprise before 2021.1.2. There is potential remote code execution via the application startup configuration. The installation configuration user interface (available to administrators) allows specifying arbitrary Java Virtual Machine startup options. Some of these options, such as -XX:OnOutOfMemoryError, allow specifying a command to be run on the host. This can be abused to run arbitrary commands on the host, should an attacker gain administrative access to the application.
References
Link Resource
https://security.gradle.com Vendor Advisory
https://security.gradle.com/advisory/2021-08 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gradle:enterprise:*:*:*:*:*:*:*:*

History

03 Nov 2021, 12:56

Type Values Removed Values Added
CPE cpe:2.3:a:gradle:enterprise:*:*:*:*:*:*:*:*
References (MISC) https://security.gradle.com - (MISC) https://security.gradle.com - Vendor Advisory
References (MISC) https://security.gradle.com/advisory/2021-08 - (MISC) https://security.gradle.com/advisory/2021-08 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 9.0
v3 : 7.2
CWE CWE-94

27 Oct 2021, 14:18

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-27 14:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-41619

Mitre link : CVE-2021-41619

CVE.ORG link : CVE-2021-41619


JSON object : View

Products Affected

gradle

  • enterprise
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')