CVE-2023-44387Incorrect Permission Assignment in Gradle

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 78.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 5
Latest updateJan 15

Description

Gradle is a build tool with a focus on build automation and support for multi-language development. When copying or archiving symlinked files, Gradle resolves them but applies the permissions of the symlink itself instead of the permissions of the linked file to the resulting file. This leads to files having too much permissions given that symlinks usually are world readable and writeable. While it is unlikely this results in a direct vulnerability for the impacted build, it may open up attack v

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:NExploitability: 2.0 | Impact: 4.0

Affected Packages3 packages

CVEListV5gradle/gradle< 8.4.0+1
NVDgradle/gradle8.0.08.4.0+1
debiandebian/gradle

Patches

🔴Vulnerability Details

1
OSV
CVE-2023-44387: Gradle is a build tool with a focus on build automation and support for multi-language development2023-10-05

📋Vendor Advisories

3
Oracle
Oracle Oracle Siebel CRM Risk Matrix: Open UI (Gradle) — CVE-2023-443872025-01-15
Red Hat
gradle: Incorrect permission assignment for symlinked files used in copy or archiving operations2023-10-05
Debian
CVE-2023-44387: gradle - Gradle is a build tool with a focus on build automation and support for multi-la...2023

🕵️Threat Intelligence

2
Wiz
CVE-2026-22865 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-22816 Impact, Exploitability, and Mitigation Steps | Wiz