{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T19:45:39.459","vulnerabilities":[{"cve":{"id":"CVE-2024-46881","sourceIdentifier":"cve@mitre.org","published":"2025-01-26T07:15:08.947","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Develocity (formerly Gradle Enterprise) before 2024.1.8 has Incorrect Access Control. Project-level access control configuration was introduced in Enterprise Config schema version 8. Migration functionality from schema version 8 to versions 9 and 10 (in affected vulnerable versions) does not include the projects section of the configuration. This leads to all of the project settings being reset to their defaults when the old schema is loaded. In the case of projects.enabled, the default is false. Thus, using an enterprise config v8 results in Project level access control being disabled, even if it was previously enabled, and previously restricted project information disclosed. Most commonly, this occurs when a Develocity instance is upgraded from an earlier version. Specifically, this occurs if: Develocity 2023.3.X is upgraded to 2023.4.X; Develocity 2023.3.X is upgraded to 2024.1.X up to and including 2024.1.7; or Develocity 2023.4.X is upgraded to 2024.1.X up to and including 2024.1.7. The flaw does not occur when upgrading to a fixed version. An upgrade can only be triggered via administrator access, and cannot be forced by an external attacker."},{"lang":"es","value":"Develocity (anteriormente Gradle Enterprise) antes de 2024.1.8 tiene un control de acceso incorrecto. La configuración de control de acceso a nivel de proyecto se introdujo en la versión 8 del esquema de Enterprise Config. La funcionalidad de migración de la versión 8 del esquema a las versiones 9 y 10 (en las versiones vulnerables afectadas) no incluye la sección de proyectos de la configuración. Esto hace que todas las configuraciones del proyecto se restablezcan a sus valores predeterminados cuando se carga el esquema anterior. En el caso de projects.enabled, el valor predeterminado es false. Por lo tanto, el uso de una configuración empresarial v8 da como resultado que el control de acceso a nivel de proyecto se deshabilite, incluso si estaba habilitado anteriormente, y que se revele información del proyecto restringida anteriormente. Lo más común es que esto ocurra cuando una instancia de Develocity se actualiza desde una versión anterior. Específicamente, esto ocurre si: Develocity 2023.3.X se actualiza a 2023.4.X; Develocity 2023.3.X se actualiza a 2024.1.X hasta incluida 2024.1.7; o Develocity 2023.4.X se actualiza a 2024.1.X hasta incluida 2024.1.7. La falla no ocurre cuando se actualiza a versión correctora. Una actualización solo se puede activar a través del acceso de administrador y no puede ser forzada por un atacante externo."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.2}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-732"}]}],"references":[{"url":"https://security.gradle.com/advisory/2024-03","source":"cve@mitre.org"}]}}]}