fkie_cve-2024-46881
Vulnerability from fkie_nvd
Published
2025-01-26 07:15
Modified
2025-01-26 07:15
Summary
Develocity (formerly Gradle Enterprise) before 2024.1.8 has Incorrect Access Control. Project-level access control configuration was introduced in Enterprise Config schema version 8. Migration functionality from schema version 8 to versions 9 and 10 (in affected vulnerable versions) does not include the projects section of the configuration. This leads to all of the project settings being reset to their defaults when the old schema is loaded. In the case of projects.enabled, the default is false. Thus, using an enterprise config v8 results in Project level access control being disabled, even if it was previously enabled, and previously restricted project information disclosed. Most commonly, this occurs when a Develocity instance is upgraded from an earlier version. Specifically, this occurs if: Develocity 2023.3.X is upgraded to 2023.4.X; Develocity 2023.3.X is upgraded to 2024.1.X up to and including 2024.1.7; or Develocity 2023.4.X is upgraded to 2024.1.X up to and including 2024.1.7. The flaw does not occur when upgrading to a fixed version. An upgrade can only be triggered via administrator access, and cannot be forced by an external attacker.
Impacted products
Vendor Product Version



{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Develocity (formerly Gradle Enterprise) before 2024.1.8 has Incorrect Access Control. Project-level access control configuration was introduced in Enterprise Config schema version 8. Migration functionality from schema version 8 to versions 9 and 10 (in affected vulnerable versions) does not include the projects section of the configuration. This leads to all of the project settings being reset to their defaults when the old schema is loaded. In the case of projects.enabled, the default is false. Thus, using an enterprise config v8 results in Project level access control being disabled, even if it was previously enabled, and previously restricted project information disclosed. Most commonly, this occurs when a Develocity instance is upgraded from an earlier version. Specifically, this occurs if: Develocity 2023.3.X is upgraded to 2023.4.X; Develocity 2023.3.X is upgraded to 2024.1.X up to and including 2024.1.7; or Develocity 2023.4.X is upgraded to 2024.1.X up to and including 2024.1.7. The flaw does not occur when upgrading to a fixed version. An upgrade can only be triggered via administrator access, and cannot be forced by an external attacker."
    },
    {
      "lang": "es",
      "value": "Develocity (anteriormente Gradle Enterprise) antes de 2024.1.8 tiene un control de acceso incorrecto. La configuraci\u00f3n de control de acceso a nivel de proyecto se introdujo en la versi\u00f3n 8 del esquema de Enterprise Config. La funcionalidad de migraci\u00f3n de la versi\u00f3n 8 del esquema a las versiones 9 y 10 (en las versiones vulnerables afectadas) no incluye la secci\u00f3n de proyectos de la configuraci\u00f3n. Esto hace que todas las configuraciones del proyecto se restablezcan a sus valores predeterminados cuando se carga el esquema anterior. En el caso de projects.enabled, el valor predeterminado es false. Por lo tanto, el uso de una configuraci\u00f3n empresarial v8 da como resultado que el control de acceso a nivel de proyecto se deshabilite, incluso si estaba habilitado anteriormente, y que se revele informaci\u00f3n del proyecto restringida anteriormente. Lo m\u00e1s com\u00fan es que esto ocurra cuando una instancia de Develocity se actualiza desde una versi\u00f3n anterior. Espec\u00edficamente, esto ocurre si: Develocity 2023.3.X se actualiza a 2023.4.X; Develocity 2023.3.X se actualiza a 2024.1.X hasta incluida 2024.1.7; o Develocity 2023.4.X se actualiza a 2024.1.X hasta incluida 2024.1.7. La falla no ocurre cuando se actualiza a versi\u00f3n correctora. Una actualizaci\u00f3n solo se puede activar a trav\u00e9s del acceso de administrador y no puede ser forzada por un atacante externo."
    }
  ],
  "id": "CVE-2024-46881",
  "lastModified": "2025-01-26T07:15:08.947",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 4.2,
        "source": "cve@mitre.org",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-01-26T07:15:08.947",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://security.gradle.com/advisory/2024-03"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "cve@mitre.org",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…