Vulnerabilites related to JetBrains - RubyMine
Vulnerability from fkie_nvd
Published
2025-04-17 16:16
Modified
2025-04-25 16:30
Severity ?
8.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Summary
In JetBrains RubyMine before 2025.1 remote Interpreter overwrote ports to listen on all interfaces
References
▶ | URL | Tags | |
---|---|---|---|
cve@jetbrains.com | https://www.jetbrains.com/privacy-security/issues-fixed/ | Vendor Advisory, Issue Tracking |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*", "matchCriteriaId": "93CDCCB9-5BB6-4FD7-A5A8-A80E437F805C", "versionEndExcluding": "2025.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains RubyMine before 2025.1 remote Interpreter overwrote ports to listen on all interfaces" }, { "lang": "es", "value": "En JetBrains RubyMine antes de 2025.1, el int\u00e9rprete remoto sobrescrib\u00eda los puertos para escuchar en todas las interfaces" } ], "id": "CVE-2025-43015", "lastModified": "2025-04-25T16:30:24.887", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.7, "source": "cve@jetbrains.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-04-17T16:16:00.170", "references": [ { "source": "cve@jetbrains.com", "tags": [ "Vendor Advisory", "Issue Tracking" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "sourceIdentifier": "cve@jetbrains.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1188" } ], "source": "cve@jetbrains.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-1188" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-06-10 16:15
Modified
2024-11-21 09:23
Severity ?
9.3 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
jetbrains | aqua | * | |
jetbrains | clion | * | |
jetbrains | clion | * | |
jetbrains | clion | * | |
jetbrains | clion | * | |
jetbrains | datagrip | * | |
jetbrains | datagrip | * | |
jetbrains | datagrip | * | |
jetbrains | datagrip | * | |
jetbrains | dataspell | * | |
jetbrains | dataspell | * | |
jetbrains | dataspell | * | |
jetbrains | dataspell | * | |
jetbrains | goland | * | |
jetbrains | goland | * | |
jetbrains | goland | * | |
jetbrains | goland | * | |
jetbrains | intellij_idea | * | |
jetbrains | intellij_idea | * | |
jetbrains | intellij_idea | * | |
jetbrains | intellij_idea | * | |
jetbrains | mps | * | |
jetbrains | mps | 2023.3.0 | |
jetbrains | phpstorm | * | |
jetbrains | phpstorm | * | |
jetbrains | phpstorm | * | |
jetbrains | phpstorm | * | |
jetbrains | pycharm | * | |
jetbrains | pycharm | * | |
jetbrains | pycharm | * | |
jetbrains | pycharm | * | |
jetbrains | rider | * | |
jetbrains | rider | * | |
jetbrains | rider | * | |
jetbrains | rider | * | |
jetbrains | rubymine | * | |
jetbrains | rubymine | * | |
jetbrains | rubymine | * | |
jetbrains | rubymine | * | |
jetbrains | rustrover | * | |
jetbrains | webstorm | * | |
jetbrains | webstorm | * | |
jetbrains | webstorm | * | |
jetbrains | webstorm | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:aqua:*:*:*:*:*:*:*:*", "matchCriteriaId": "20608E8B-5B89-41AC-BDF9-1B78BA4CDE62", "versionEndExcluding": "2024.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:clion:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FC5C849-5663-4040-A967-D82B67588F15", "versionEndExcluding": "2023.1.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:clion:*:*:*:*:*:*:*:*", "matchCriteriaId": "394A2D3B-C1D5-4942-A6B3-326DA6E4586B", "versionEndExcluding": "2023.2.4", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:clion:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB121B1D-34B9-4C08-8652-4791E7B92C20", "versionEndExcluding": "2023.3.5", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:clion:*:*:*:*:*:*:*:*", "matchCriteriaId": "177F5831-420A-4EC7-8520-79BEA7DC91A1", "versionEndExcluding": "2024.1.3", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:datagrip:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F42B34B-DD62-4076-B965-D784F28361F1", "versionEndExcluding": "2023.1.3", "versionStartIncluding": "2023.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:datagrip:*:*:*:*:*:*:*:*", "matchCriteriaId": "8371359A-BCB7-40E6-BE71-16E107288E49", "versionEndExcluding": "2023.2.4", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:datagrip:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B2E54A2-FCAF-451D-87D2-70F9D4DC5C5F", "versionEndExcluding": "2023.3.5", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:datagrip:*:*:*:*:*:*:*:*", "matchCriteriaId": "198ED5D0-C88D-4AFA-9E15-9934C66650F6", "versionEndExcluding": "2024.1.4", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:dataspell:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD714D72-765A-4C2B-A1EA-ED79681DF0A1", "versionEndExcluding": "2023.1.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:dataspell:*:*:*:*:*:*:*:*", "matchCriteriaId": "04D60572-17BB-4F5C-96E2-41482F0312DA", "versionEndExcluding": "2023.2.7", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:dataspell:*:*:*:*:*:*:*:*", "matchCriteriaId": "249CCE69-467E-4181-B114-4BE2566CFAC4", "versionEndExcluding": "2023.3.6", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:dataspell:*:*:*:*:*:*:*:*", "matchCriteriaId": "2523C4F3-39A5-4FCA-90CA-3B121460733B", "versionEndExcluding": "2024.1.2", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:goland:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF8C3F6C-4CAD-4AFC-9625-7CDD5AB2472E", "versionEndExcluding": "2023.1.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:goland:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7FA39DB-F6A1-4213-A0BF-37A1FFC56CF2", "versionEndExcluding": "2023.2.7", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:goland:*:*:*:*:*:*:*:*", "matchCriteriaId": "91F7AE04-C3B2-4700-89C2-64FFD59C313B", "versionEndExcluding": "2023.3.7", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:goland:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB43612E-FD6C-4220-8B11-336B4F2AF1ED", "versionEndExcluding": "2024.1.3", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B29A0AC-82A9-4E3B-A425-CE60024A0B2B", "versionEndExcluding": "2023.1.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "3284FF4C-73B4-41B8-8F68-AF8DD234DDB6", "versionEndExcluding": "2023.2.7", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "39D4B44F-9182-437D-8E69-FDE818F7921B", "versionEndExcluding": "2023.3.7", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBF21B58-29E9-4446-A27A-BB12C7C311E9", "versionEndExcluding": "2024.1.3", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:mps:*:*:*:*:*:*:*:*", "matchCriteriaId": "B284C2E0-4CE1-49BA-9AEF-8B0B5D6CB33C", "versionEndExcluding": "2023.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:mps:2023.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1342D0F0-35E1-42B6-8D0B-95D2C6E5E348", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:phpstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FC207EA-07BE-403B-B759-900F3EE90272", "versionEndExcluding": "2023.1.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:phpstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "71DF05BF-A5E6-4BCF-B806-BD4E73D4D903", "versionEndExcluding": "2023.2.6", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:phpstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "61A47B15-DA71-48AE-8AA0-B9BA68F20AFC", "versionEndExcluding": "2023.3.7", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:phpstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "07D8FF11-75BC-4802-8414-7A132D929040", "versionEndExcluding": "2024.1.3", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:pycharm:*:*:*:*:*:*:*:*", "matchCriteriaId": "21BB4064-431B-4D86-9C48-D2AC47E37226", "versionEndExcluding": "2023.1.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:pycharm:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD2CF5D2-0BC4-43F2-BC49-CB3F3641B9E1", "versionEndExcluding": "2023.2.7", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:pycharm:*:*:*:*:*:*:*:*", "matchCriteriaId": "394B00FC-FBA7-40FE-8082-28C662692ECB", "versionEndExcluding": "2023.3.6", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:pycharm:*:*:*:*:*:*:*:*", "matchCriteriaId": "C55365AC-1F86-4EDF-BB75-0AD048E6BE21", "versionEndExcluding": "2024.1.3", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B5658AA-5223-4E63-BB1F-9584C614CBE6", "versionEndExcluding": "2023.1.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DC318D9-7713-42E1-BD17-B3A569F356EF", "versionEndExcluding": "2023.2.5", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5525193-53E0-42B5-87CD-DDABBFBCBD99", "versionEndExcluding": "2023.3.6", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62FF44C-C639-4751-A512-9A88E7D16982", "versionEndExcluding": "2024.1.3", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*", "matchCriteriaId": "C88E44A7-4F55-47DD-8B45-33FA50FF4D92", "versionEndExcluding": "2023.1.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*", "matchCriteriaId": "017D5DBB-AD63-4B95-86BD-A1425EB4D881", "versionEndExcluding": "2023.2.7", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*", "matchCriteriaId": "091F7E8D-18F9-47BA-9DC9-96245DF10789", "versionEndExcluding": "2023.3.7", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*", "matchCriteriaId": "34DC255F-9ECC-4B41-A8BA-0F70792823A3", "versionEndExcluding": "2024.1.3", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rustrover:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EA65266-C23F-403C-AD23-59096B41AD58", "versionEndExcluding": "2024.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6367B0C-9050-4BDC-9D26-80C251FC3270", "versionEndExcluding": "2023.1.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA57E3D7-80D1-420F-9FA7-2D503626027F", "versionEndExcluding": "2023.2.7", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D60460C9-6913-441E-99BE-19EB4459836F", "versionEndExcluding": "2023.3.7", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "1720820F-2FB4-4AAC-A139-CF7C493A751A", "versionEndExcluding": "2024.1.4", "versionStartIncluding": "2024.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4" }, { "lang": "es", "value": "El token de acceso de GitHub podr\u00eda estar expuesto a sitios de terceros en los IDE de JetBrains posteriores a la versi\u00f3n 2023.1 y anteriores a: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4 " } ], "id": "CVE-2024-37051", "lastModified": "2024-11-21T09:23:06.323", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.8, "source": "cve@jetbrains.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-06-10T16:15:16.713", "references": [ { "source": "cve@jetbrains.com", "url": "https://security.netapp.com/advisory/ntap-20240705-0004/" }, { "source": "cve@jetbrains.com", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20240705-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "sourceIdentifier": "cve@jetbrains.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "cve@jetbrains.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-06 14:15
Modified
2024-11-21 06:15
Severity ?
Summary
In JetBrains RubyMine before 2021.1.1, code execution without user confirmation was possible for untrusted projects.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E56ED61-A25F-4F68-8F48-5E9B99616A54", "versionEndExcluding": "2021.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains RubyMine before 2021.1.1, code execution without user confirmation was possible for untrusted projects." }, { "lang": "es", "value": "En JetBrains RubyMine versiones anteriores a 2021.1.1, era posible una ejecuci\u00f3n de c\u00f3digo sin la confirmaci\u00f3n del usuario para proyectos no confiables" } ], "id": "CVE-2021-37543", "lastModified": "2024-11-21T06:15:22.287", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-06T14:15:08.070", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-25 15:15
Modified
2024-11-21 06:33
Severity ?
Summary
JetBrains IntelliJ IDEA 2021.3.1 Preview, IntelliJ IDEA 2021.3.1 RC, PyCharm Professional 2021.3.1 RC, GoLand 2021.3.1, PhpStorm 2021.3.1 Preview, PhpStorm 2021.3.1 RC, RubyMine 2021.3.1 Preview, RubyMine 2021.3.1 RC, CLion 2021.3.1, WebStorm 2021.3.1 Preview, and WebStorm 2021.3.1 RC (used as Remote Development backend IDEs) bind to the 0.0.0.0 IP address. The fixed versions are: IntelliJ IDEA 2021.3.1, PyCharm Professional 2021.3.1, GoLand 2021.3.2, PhpStorm 2021.3.1 (213.6461.83), RubyMine 2021.3.1, CLion 2021.3.2, and WebStorm 2021.3.1.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
jetbrains | clion | 2021.3.1 | |
jetbrains | goland | 2021.3.1 | |
jetbrains | intellij_idea | 2021.3.1 | |
jetbrains | intellij_idea | 2021.3.1 | |
jetbrains | phpstorm | 2021.3.1 | |
jetbrains | phpstorm | 2021.3.1 | |
jetbrains | pycharm | 2021.3.1 | |
jetbrains | rubymine | 2021.3.1 | |
jetbrains | rubymine | 2021.3.1 | |
jetbrains | webstorm | 2021.3.1 | |
jetbrains | webstorm | 2021.3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:clion:2021.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7905F91F-C635-4247-9035-2A925D81DAD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:goland:2021.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1580A59C-98A3-4364-8CE6-446978717DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:intellij_idea:2021.3.1:preview:*:*:*:*:*:*", "matchCriteriaId": "58106DEB-A207-419E-BC7D-3314A183933C", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:intellij_idea:2021.3.1:rc:*:*:*:*:*:*", "matchCriteriaId": "B9BFA1D8-88E8-4FAE-8AA1-E6B5A1A2B116", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:phpstorm:2021.3.1:preview:*:*:*:*:*:*", "matchCriteriaId": "FC94D4DD-BF03-4AC0-BC09-AFC0A610EAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:phpstorm:2021.3.1:rc:*:*:*:*:*:*", "matchCriteriaId": "0F0AAD1A-350D-4C05-851F-336B002D7625", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:pycharm:2021.3.1:2021.3.1:*:*:professional:*:*:*", "matchCriteriaId": "863E231E-BA8B-4AFF-93B5-AC4B6ED77DB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rubymine:2021.3.1:preview:*:*:*:*:*:*", "matchCriteriaId": "53907452-7757-478A-BB2C-6BC6D71021BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rubymine:2021.3.1:rc:*:*:*:*:*:*", "matchCriteriaId": "EA1040E6-253E-4B28-9742-D0ECC253BF99", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:webstorm:2021.3.1:preview:*:*:*:*:*:*", "matchCriteriaId": "6C1FC666-E2B2-4A7A-8D85-D5B9BDF7CA30", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:webstorm:2021.3.1:rc:*:*:*:*:*:*", "matchCriteriaId": "EE80631A-58C8-41B0-A64C-EA4BACB4DB5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "JetBrains IntelliJ IDEA 2021.3.1 Preview, IntelliJ IDEA 2021.3.1 RC, PyCharm Professional 2021.3.1 RC, GoLand 2021.3.1, PhpStorm 2021.3.1 Preview, PhpStorm 2021.3.1 RC, RubyMine 2021.3.1 Preview, RubyMine 2021.3.1 RC, CLion 2021.3.1, WebStorm 2021.3.1 Preview, and WebStorm 2021.3.1 RC (used as Remote Development backend IDEs) bind to the 0.0.0.0 IP address. The fixed versions are: IntelliJ IDEA 2021.3.1, PyCharm Professional 2021.3.1, GoLand 2021.3.2, PhpStorm 2021.3.1 (213.6461.83), RubyMine 2021.3.1, CLion 2021.3.2, and WebStorm 2021.3.1." }, { "lang": "es", "value": "JetBrains IntelliJ IDEA versi\u00f3n 2021.3.1 Preview, IntelliJ IDEA versi\u00f3n 2021.3.1 RC, PyCharm Professional versi\u00f3n 2021.3.1 RC, GoLand versi\u00f3n 2021.3.1, PhpStorm versi\u00f3n 2021.3.1 Preview, PhpStorm versi\u00f3n 2021.3.1 RC, RubyMine versi\u00f3n 2021. 3.1 Preview, RubyMine versi\u00f3n 2021.3.1 RC, CLion versi\u00f3n 2021.3.1, WebStorm versi\u00f3n 2021.3.1 Preview, y WebStorm versi\u00f3n 2021.3.1 RC (usados como IDEs de desarrollo remoto) son enlazados a la direcci\u00f3n IP 0.0.0.0. Las versiones fijas son: IntelliJ IDEA versi\u00f3n 2021.3.1, PyCharm Professional versi\u00f3n 2021.3.1, GoLand versi\u00f3n 2021.3.2, PhpStorm versi\u00f3n 2021.3.1 (213.6461.83), RubyMine versi\u00f3n 2021.3.1, CLion versi\u00f3n 2021.3.2, y WebStorm versi\u00f3n 2021.3.1." } ], "id": "CVE-2021-45977", "lastModified": "2024-11-21T06:33:24.713", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-25T15:15:09.667", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://jetbrains.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://jetbrains.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2021-45977 (GCVE-0-2021-45977)
Vulnerability from cvelistv5
Published
2022-02-25 14:36
Modified
2024-08-04 04:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
JetBrains IntelliJ IDEA 2021.3.1 Preview, IntelliJ IDEA 2021.3.1 RC, PyCharm Professional 2021.3.1 RC, GoLand 2021.3.1, PhpStorm 2021.3.1 Preview, PhpStorm 2021.3.1 RC, RubyMine 2021.3.1 Preview, RubyMine 2021.3.1 RC, CLion 2021.3.1, WebStorm 2021.3.1 Preview, and WebStorm 2021.3.1 RC (used as Remote Development backend IDEs) bind to the 0.0.0.0 IP address. The fixed versions are: IntelliJ IDEA 2021.3.1, PyCharm Professional 2021.3.1, GoLand 2021.3.2, PhpStorm 2021.3.1 (213.6461.83), RubyMine 2021.3.1, CLion 2021.3.2, and WebStorm 2021.3.1.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:54:31.110Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jetbrains.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "JetBrains IntelliJ IDEA 2021.3.1 Preview, IntelliJ IDEA 2021.3.1 RC, PyCharm Professional 2021.3.1 RC, GoLand 2021.3.1, PhpStorm 2021.3.1 Preview, PhpStorm 2021.3.1 RC, RubyMine 2021.3.1 Preview, RubyMine 2021.3.1 RC, CLion 2021.3.1, WebStorm 2021.3.1 Preview, and WebStorm 2021.3.1 RC (used as Remote Development backend IDEs) bind to the 0.0.0.0 IP address. The fixed versions are: IntelliJ IDEA 2021.3.1, PyCharm Professional 2021.3.1, GoLand 2021.3.2, PhpStorm 2021.3.1 (213.6461.83), RubyMine 2021.3.1, CLion 2021.3.2, and WebStorm 2021.3.1." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T14:36:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jetbrains.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45977", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JetBrains IntelliJ IDEA 2021.3.1 Preview, IntelliJ IDEA 2021.3.1 RC, PyCharm Professional 2021.3.1 RC, GoLand 2021.3.1, PhpStorm 2021.3.1 Preview, PhpStorm 2021.3.1 RC, RubyMine 2021.3.1 Preview, RubyMine 2021.3.1 RC, CLion 2021.3.1, WebStorm 2021.3.1 Preview, and WebStorm 2021.3.1 RC (used as Remote Development backend IDEs) bind to the 0.0.0.0 IP address. The fixed versions are: IntelliJ IDEA 2021.3.1, PyCharm Professional 2021.3.1, GoLand 2021.3.2, PhpStorm 2021.3.1 (213.6461.83), RubyMine 2021.3.1, CLion 2021.3.2, and WebStorm 2021.3.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://jetbrains.com", "refsource": "MISC", "url": "https://jetbrains.com" }, { "name": "https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/", "refsource": "MISC", "url": "https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45977", "datePublished": "2022-02-25T14:36:13", "dateReserved": "2022-01-01T00:00:00", "dateUpdated": "2024-08-04T04:54:31.110Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-37051 (GCVE-0-2024-37051)
Vulnerability from cvelistv5
Published
2024-06-10 15:58
Modified
2025-02-13 17:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-522 - Insufficiently Protected Credentials
Summary
GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | JetBrains | IntelliJ IDEA |
Version: 2023.1 ≤ Version: 2023.1 ≤ Version: 2023.1 ≤ Version: 2023.1 ≤ Version: 2023.1 ≤ |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:jetbrains:intellij_idea:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "intellij_idea", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:intellij_idea:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "intellij_idea", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:intellij_idea:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "intellij_idea", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:intellij_idea:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "intellij_idea", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:intellij_idea:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "intellij_idea", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.2 EAP3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:aqua:2024.1.2:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "aqua", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:clion:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "clion", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:clion:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "clion", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.4", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:clion:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "clion", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.5", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:clion:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "clion", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:datagrip:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "datagrip", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.4", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:dataspell:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dataspell", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:clion:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "clion", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.2_eap2", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:datagrip:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "datagrip", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:datagrip:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "datagrip", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.4", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:datagrip:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "datagrip", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.5", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:dataspell:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dataspell", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:dataspell:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dataspell", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:dataspell:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dataspell", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.2", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:dataspell:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dataspell", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.2 EAP1", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:goland:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "goland", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:goland:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "goland", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:goland:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "goland", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:goland:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "goland", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:goland:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "goland", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.2 EAP3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:mps:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mps", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.1", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:mps:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mps", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.1", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:mps:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mps", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1 EAP2", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:phpstorm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "phpstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:phpstorm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "phpstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:phpstorm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "phpstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:phpstorm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "phpstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:phpstorm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "phpstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.2 EAP3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:pycharm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pycharm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:pycharm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pycharm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:pycharm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pycharm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:pycharm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pycharm", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:pycharm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pycharm", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.2 EAP2", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rider:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rider", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rider:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rider", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.5", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rider:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rider", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:clion:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "clion", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rubymine", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rubymine", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rubymine", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rubymine", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rubymine", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.2 EAP4", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rustrover:2024.1.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rustrover", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "webstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "webstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "webstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "webstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.4", "status": "affected", "version": "2023.1", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37051", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-17T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-17T03:55:09.096Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240705-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "IntelliJ IDEA", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.2 EAP3", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Aqua", "vendor": "JetBrains", "versions": [ { "lessThan": "2024.1.2", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CLion", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.4", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.5", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.2 EAP2", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "DataGrip", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.4", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.5", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.4", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "DataSpell", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.2", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.2 EAP1", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "GoLand", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.2 EAP3", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "MPS", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.2.1", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.1", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1 EAP2", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "PhpStorm", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.2 EAP3", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "PyCharm", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.2 EAP2", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Rider", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.5", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "RubyMine", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.2 EAP4", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "RustRover", "vendor": "JetBrains", "versions": [ { "lessThan": "2024.1.1", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "WebStorm", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.4", "status": "affected", "version": "2023.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522: Insufficiently Protected Credentials", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-05T16:06:01.631Z", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "url": "https://security.netapp.com/advisory/ntap-20240705-0004/" } ] } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2024-37051", "datePublished": "2024-06-10T15:58:06.021Z", "dateReserved": "2024-05-31T14:05:53.462Z", "dateUpdated": "2025-02-13T17:52:58.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-37543 (GCVE-0-2021-37543)
Vulnerability from cvelistv5
Published
2021-08-06 13:21
Modified
2024-08-04 01:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In JetBrains RubyMine before 2021.1.1, code execution without user confirmation was possible for untrusted projects.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains RubyMine before 2021.1.1, code execution without user confirmation was possible for untrusted projects." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-06T13:21:46", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-37543", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In JetBrains RubyMine before 2021.1.1, code execution without user confirmation was possible for untrusted projects." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/", "refsource": "MISC", "url": "https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-37543", "datePublished": "2021-08-06T13:21:46", "dateReserved": "2021-07-26T00:00:00", "dateUpdated": "2024-08-04T01:23:01.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-43015 (GCVE-0-2025-43015)
Vulnerability from cvelistv5
Published
2025-04-17 15:56
Modified
2025-04-17 17:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
In JetBrains RubyMine before 2025.1 remote Interpreter overwrote ports to listen on all interfaces
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-43015", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T17:23:24.318845Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188 Initialization of a Resource with an Insecure Default", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T17:23:40.313Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "RubyMine", "vendor": "JetBrains", "versions": [ { "lessThan": "2025.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains RubyMine before 2025.1 remote Interpreter overwrote ports to listen on all interfaces" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T15:56:05.386Z", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ] } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2025-43015", "datePublished": "2025-04-17T15:56:05.386Z", "dateReserved": "2025-04-16T13:26:24.244Z", "dateUpdated": "2025-04-17T17:23:40.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }