Develocity (formerly Gradle Enterprise) before 2024.3.1 allows an attacker who has network access to a Develocity server to obtain the hashed password of the system user. The hash algorithm used by Develocity was chosen according to best practices for password storage and provides some protection against brute-force attempts. The applicable severity of this vulnerability depends on whether a Develocity server is accessible by external or unauthorized users, and the complexity of the System User password.
History

Sun, 26 Jan 2025 06:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-201
Metrics cvssV4_0

{'score': 8.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N'}


Sun, 26 Jan 2025 06:15:00 +0000

Type Values Removed Values Added
Description Develocity (formerly Gradle Enterprise) before 2024.3.1 allows an attacker who has network access to a Develocity server to obtain the hashed password of the system user. The hash algorithm used by Develocity was chosen according to best practices for password storage and provides some protection against brute-force attempts. The applicable severity of this vulnerability depends on whether a Develocity server is accessible by external or unauthorized users, and the complexity of the System User password.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-02-12T20:01:14.275Z

Reserved: 2025-01-26T00:00:00.000Z

Link: CVE-2025-24858

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-01-26T06:15:23.470

Modified: 2025-01-26T07:15:09.237

Link: CVE-2025-24858

cve-icon Redhat

No data.