Vulnerabilites related to jetbrains - rider
CVE-2022-37396 (GCVE-0-2022-37396)
Vulnerability from cvelistv5
Published
2022-08-03 15:40
Modified
2024-08-03 10:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Summary
In JetBrains Rider before 2022.2 Trust and Open Project dialog could be bypassed, leading to local code execution
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:29:21.005Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Rider", "vendor": "JetBrains", "versions": [ { "lessThan": "2022.2", "status": "affected", "version": "2022.2", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Rider before 2022.2 Trust and Open Project dialog could be bypassed, leading to local code execution" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-03T15:40:10", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "source": { "defect": [ "RIDER-74325", "RIDER-74328" ], "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jetbrains.com", "ID": "CVE-2022-37396", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Rider", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2022.2", "version_value": "2022.2" } ] } } ] }, "vendor_name": "JetBrains" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In JetBrains Rider before 2022.2 Trust and Open Project dialog could be bypassed, leading to local code execution" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jetbrains.com/privacy-security/issues-fixed/", "refsource": "MISC", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ] }, "source": { "defect": [ "RIDER-74325", "RIDER-74328" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2022-37396", "datePublished": "2022-08-03T15:40:10", "dateReserved": "2022-08-03T00:00:00", "dateUpdated": "2024-08-03T10:29:21.005Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-23385 (GCVE-0-2025-23385)
Vulnerability from cvelistv5
Published
2025-01-28 16:01
Modified
2025-01-28 16:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-114 - Process Control
Summary
In JetBrains ReSharper before 2024.3.4, 2024.2.8, and 2024.1.7, Rider before 2024.3.4, 2024.2.8, and 2024.1.7, dotTrace before 2024.3.4, 2024.2.8, and 2024.1.7, ETW Host Service before 16.43, Local Privilege Escalation via the ETW Host Service was possible
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-23385", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T16:25:22.095430Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-28T16:26:10.127Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ReSharper", "vendor": "JetBrains", "versions": [ { "lessThan": "2024.3.4", "status": "affected", "version": "2024.3", "versionType": "semver" }, { "lessThan": "2024.2.8", "status": "affected", "version": "2024.2", "versionType": "semver" }, { "lessThan": "2024.1.7", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Rider", "vendor": "JetBrains", "versions": [ { "lessThan": "2024.3.4", "status": "affected", "version": "2024.3", "versionType": "semver" }, { "lessThan": "2024.2.8", "status": "affected", "version": "2024.2", "versionType": "semver" }, { "lessThan": "2024.1.7", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "dotTrace", "vendor": "JetBrains", "versions": [ { "lessThan": "2024.3.4", "status": "affected", "version": "2024.3", "versionType": "semver" }, { "lessThan": "2024.2.8", "status": "affected", "version": "2024.2", "versionType": "semver" }, { "lessThan": "2024.1.7", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "ETW Host Service", "vendor": "JetBrains", "versions": [ { "lessThan": "16.43", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains ReSharper before 2024.3.4, 2024.2.8, and 2024.1.7, Rider before 2024.3.4, 2024.2.8, and 2024.1.7, dotTrace before 2024.3.4, 2024.2.8, and 2024.1.7, ETW Host Service before 16.43, Local Privilege Escalation via the ETW Host Service was possible" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-114", "description": "CWE-114: Process Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T16:01:55.084Z", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ] } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2025-23385", "datePublished": "2025-01-28T16:01:55.084Z", "dateReserved": "2025-01-15T11:51:10.292Z", "dateUpdated": "2025-01-28T16:26:10.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-7906 (GCVE-0-2020-7906)
Vulnerability from cvelistv5
Published
2020-01-30 17:09
Modified
2024-08-04 09:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In JetBrains Rider versions 2019.3 EAP2 through 2019.3 EAP7, there were unsigned binaries provided by the Windows installer. This issue was fixed in release version 2019.3.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:48:23.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.jetbrains.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.jetbrains.com/blog/2020/01/24/jetbrains-security-bulletin-q4-2019/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Rider versions 2019.3 EAP2 through 2019.3 EAP7, there were unsigned binaries provided by the Windows installer. This issue was fixed in release version 2019.3." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-30T17:09:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.jetbrains.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.jetbrains.com/blog/2020/01/24/jetbrains-security-bulletin-q4-2019/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-7906", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In JetBrains Rider versions 2019.3 EAP2 through 2019.3 EAP7, there were unsigned binaries provided by the Windows installer. This issue was fixed in release version 2019.3." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.jetbrains.com", "refsource": "MISC", "url": "https://blog.jetbrains.com" }, { "name": "https://blog.jetbrains.com/blog/2020/01/24/jetbrains-security-bulletin-q4-2019/", "refsource": "MISC", "url": "https://blog.jetbrains.com/blog/2020/01/24/jetbrains-security-bulletin-q4-2019/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-7906", "datePublished": "2020-01-30T17:09:16", "dateReserved": "2020-01-22T00:00:00", "dateUpdated": "2024-08-04T09:48:23.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29821 (GCVE-0-2022-29821)
Vulnerability from cvelistv5
Published
2022-04-28 09:55
Modified
2024-08-03 06:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Summary
In JetBrains Rider before 2022.1 local code execution via links in ReSharper Quick Documentation was possible
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.841Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Rider", "vendor": "JetBrains", "versions": [ { "lessThan": "2022.1", "status": "affected", "version": "2022.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Rider before 2022.1 local code execution via links in ReSharper Quick Documentation was possible" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-28T09:55:31", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "source": { "defect": [ "RIDER-74099" ], "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jetbrains.com", "ID": "CVE-2022-29821", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Rider", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2022.1", "version_value": "2022.1" } ] } } ] }, "vendor_name": "JetBrains" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In JetBrains Rider before 2022.1 local code execution via links in ReSharper Quick Documentation was possible" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jetbrains.com/privacy-security/issues-fixed/", "refsource": "MISC", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ] }, "source": { "defect": [ "RIDER-74099" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2022-29821", "datePublished": "2022-04-28T09:55:31", "dateReserved": "2022-04-27T00:00:00", "dateUpdated": "2024-08-03T06:33:42.841Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14960 (GCVE-0-2019-14960)
Vulnerability from cvelistv5
Published
2019-10-01 15:51
Modified
2024-08-05 00:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
JetBrains Rider before 2019.1.2 was using an unsigned JetBrains.Rider.Unity.Editor.Plugin.Repacked.dll file.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:52.826Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "JetBrains Rider before 2019.1.2 was using an unsigned JetBrains.Rider.Unity.Editor.Plugin.Repacked.dll file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-01T15:51:55", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14960", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JetBrains Rider before 2019.1.2 was using an unsigned JetBrains.Rider.Unity.Editor.Plugin.Repacked.dll file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/", "refsource": "MISC", "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14960", "datePublished": "2019-10-01T15:51:55", "dateReserved": "2019-08-12T00:00:00", "dateUpdated": "2024-08-05T00:34:52.826Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-37051 (GCVE-0-2024-37051)
Vulnerability from cvelistv5
Published
2024-06-10 15:58
Modified
2025-02-13 17:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-522 - Insufficiently Protected Credentials
Summary
GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | JetBrains | IntelliJ IDEA |
Version: 2023.1 ≤ Version: 2023.1 ≤ Version: 2023.1 ≤ Version: 2023.1 ≤ Version: 2023.1 ≤ |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:jetbrains:intellij_idea:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "intellij_idea", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:intellij_idea:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "intellij_idea", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:intellij_idea:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "intellij_idea", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:intellij_idea:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "intellij_idea", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:intellij_idea:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "intellij_idea", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.2 EAP3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:aqua:2024.1.2:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "aqua", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:clion:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "clion", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:clion:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "clion", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.4", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:clion:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "clion", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.5", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:clion:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "clion", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:datagrip:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "datagrip", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.4", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:dataspell:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dataspell", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:clion:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "clion", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.2_eap2", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:datagrip:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "datagrip", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:datagrip:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "datagrip", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.4", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:datagrip:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "datagrip", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.5", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:dataspell:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dataspell", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:dataspell:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dataspell", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:dataspell:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dataspell", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.2", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:dataspell:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dataspell", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.2 EAP1", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:goland:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "goland", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:goland:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "goland", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:goland:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "goland", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:goland:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "goland", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:goland:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "goland", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.2 EAP3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:mps:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mps", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.1", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:mps:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mps", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.1", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:mps:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mps", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1 EAP2", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:phpstorm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "phpstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:phpstorm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "phpstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:phpstorm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "phpstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:phpstorm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "phpstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:phpstorm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "phpstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.2 EAP3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:pycharm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pycharm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:pycharm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pycharm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:pycharm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pycharm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:pycharm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pycharm", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:pycharm:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pycharm", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.2 EAP2", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rider:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rider", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rider:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rider", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.5", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rider:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rider", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:clion:2023.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "clion", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rubymine", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rubymine", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rubymine", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rubymine", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rubymine", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.2 EAP4", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:rustrover:2024.1.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rustrover", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "webstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "webstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "webstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "webstorm", "vendor": "jetbrains", "versions": [ { "lessThan": "2024.1.4", "status": "affected", "version": "2023.1", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37051", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-17T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-17T03:55:09.096Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240705-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "IntelliJ IDEA", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.2 EAP3", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Aqua", "vendor": "JetBrains", "versions": [ { "lessThan": "2024.1.2", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CLion", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.4", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.5", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.2 EAP2", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "DataGrip", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.4", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.5", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.4", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "DataSpell", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.2", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.2 EAP1", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "GoLand", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.2 EAP3", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "MPS", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.2.1", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.1", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1 EAP2", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "PhpStorm", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.2 EAP3", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "PyCharm", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.2 EAP2", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Rider", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.5", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "RubyMine", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.3", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.2 EAP4", "status": "affected", "version": "2023.1", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "RustRover", "vendor": "JetBrains", "versions": [ { "lessThan": "2024.1.1", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "WebStorm", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.1.6", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.2.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2023.3.7", "status": "affected", "version": "2023.1", "versionType": "semver" }, { "lessThan": "2024.1.4", "status": "affected", "version": "2023.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522: Insufficiently Protected Credentials", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-05T16:06:01.631Z", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "url": "https://security.netapp.com/advisory/ntap-20240705-0004/" } ] } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2024-37051", "datePublished": "2024-06-10T15:58:06.021Z", "dateReserved": "2024-05-31T14:05:53.462Z", "dateUpdated": "2025-02-13T17:52:58.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-24939 (GCVE-0-2024-24939)
Vulnerability from cvelistv5
Published
2024-02-06 09:21
Modified
2024-08-01 23:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
In JetBrains Rider before 2023.3.3 logging of environment variables containing secret values was possible
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-24939", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T19:50:42.000346Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:43:14.404Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:36:20.565Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Rider", "vendor": "JetBrains", "versions": [ { "lessThan": "2023.3.3", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Rider before 2023.3.3 logging of environment variables containing secret values was possible" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-06T09:21:29.788Z", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ] } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2024-24939", "datePublished": "2024-02-06T09:21:29.788Z", "dateReserved": "2024-02-01T15:54:46.847Z", "dateUpdated": "2024-08-01T23:36:20.565Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-43016 (GCVE-0-2025-43016)
Vulnerability from cvelistv5
Published
2025-04-25 14:32
Modified
2025-04-25 15:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
In JetBrains Rider before 2025.1.2 custom archive unpacker allowed arbitrary file overwrite during remote debug session
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-43016", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-25T15:27:24.479252Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-25T15:27:30.767Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Rider", "vendor": "JetBrains", "versions": [ { "lessThan": "2025.1.2", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "In JetBrains Rider before 2025.1.2 custom archive unpacker allowed arbitrary file overwrite during remote debug session" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-25T14:32:32.399Z", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ] } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2025-43016", "datePublished": "2025-04-25T14:32:32.399Z", "dateReserved": "2025-04-16T13:26:24.691Z", "dateUpdated": "2025-04-25T15:27:30.767Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-01-30 18:15
Modified
2024-11-21 05:37
Severity ?
Summary
In JetBrains Rider versions 2019.3 EAP2 through 2019.3 EAP7, there were unsigned binaries provided by the Windows installer. This issue was fixed in release version 2019.3.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:rider:2019.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0D46C0A3-EF5A-4A99-9A5C-0B6F8CC97318", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Rider versions 2019.3 EAP2 through 2019.3 EAP7, there were unsigned binaries provided by the Windows installer. This issue was fixed in release version 2019.3." }, { "lang": "es", "value": "En JetBrains Rider versiones 2019.3 EAP2 hasta 2019.3 EAP7, se presentaron binarios no firmados provistos por parte del instalador de Windows. Este problema fue corregido en la publicaci\u00f3n de la versi\u00f3n 2019.3." } ], "id": "CVE-2020-7906", "lastModified": "2024-11-21T05:37:58.897", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-30T18:15:11.723", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2020/01/24/jetbrains-security-bulletin-q4-2019/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2020/01/24/jetbrains-security-bulletin-q4-2019/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-03 16:15
Modified
2024-11-21 07:14
Severity ?
4.1 (Medium) - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
In JetBrains Rider before 2022.2 Trust and Open Project dialog could be bypassed, leading to local code execution
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*", "matchCriteriaId": "85D3A278-6895-4A92-804E-EF851B5A3A63", "versionEndExcluding": "2022.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Rider before 2022.2 Trust and Open Project dialog could be bypassed, leading to local code execution" }, { "lang": "es", "value": "En JetBrains Rider versiones anteriores a 2022.2, el di\u00e1logo confiable y de apertura de proyectos puede ser evitada, conllevando a una ejecuci\u00f3n de c\u00f3digo local" } ], "id": "CVE-2022-37396", "lastModified": "2024-11-21T07:14:55.063", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 2.7, "source": "cve@jetbrains.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-03T16:15:08.893", "references": [ { "source": "cve@jetbrains.com", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "sourceIdentifier": "cve@jetbrains.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "cve@jetbrains.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-06-10 16:15
Modified
2024-11-21 09:23
Severity ?
9.3 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
jetbrains | aqua | * | |
jetbrains | clion | * | |
jetbrains | clion | * | |
jetbrains | clion | * | |
jetbrains | clion | * | |
jetbrains | datagrip | * | |
jetbrains | datagrip | * | |
jetbrains | datagrip | * | |
jetbrains | datagrip | * | |
jetbrains | dataspell | * | |
jetbrains | dataspell | * | |
jetbrains | dataspell | * | |
jetbrains | dataspell | * | |
jetbrains | goland | * | |
jetbrains | goland | * | |
jetbrains | goland | * | |
jetbrains | goland | * | |
jetbrains | intellij_idea | * | |
jetbrains | intellij_idea | * | |
jetbrains | intellij_idea | * | |
jetbrains | intellij_idea | * | |
jetbrains | mps | * | |
jetbrains | mps | 2023.3.0 | |
jetbrains | phpstorm | * | |
jetbrains | phpstorm | * | |
jetbrains | phpstorm | * | |
jetbrains | phpstorm | * | |
jetbrains | pycharm | * | |
jetbrains | pycharm | * | |
jetbrains | pycharm | * | |
jetbrains | pycharm | * | |
jetbrains | rider | * | |
jetbrains | rider | * | |
jetbrains | rider | * | |
jetbrains | rider | * | |
jetbrains | rubymine | * | |
jetbrains | rubymine | * | |
jetbrains | rubymine | * | |
jetbrains | rubymine | * | |
jetbrains | rustrover | * | |
jetbrains | webstorm | * | |
jetbrains | webstorm | * | |
jetbrains | webstorm | * | |
jetbrains | webstorm | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:aqua:*:*:*:*:*:*:*:*", "matchCriteriaId": "20608E8B-5B89-41AC-BDF9-1B78BA4CDE62", "versionEndExcluding": "2024.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:clion:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FC5C849-5663-4040-A967-D82B67588F15", "versionEndExcluding": "2023.1.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:clion:*:*:*:*:*:*:*:*", "matchCriteriaId": "394A2D3B-C1D5-4942-A6B3-326DA6E4586B", "versionEndExcluding": "2023.2.4", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:clion:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB121B1D-34B9-4C08-8652-4791E7B92C20", "versionEndExcluding": "2023.3.5", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:clion:*:*:*:*:*:*:*:*", "matchCriteriaId": "177F5831-420A-4EC7-8520-79BEA7DC91A1", "versionEndExcluding": "2024.1.3", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:datagrip:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F42B34B-DD62-4076-B965-D784F28361F1", "versionEndExcluding": "2023.1.3", "versionStartIncluding": "2023.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:datagrip:*:*:*:*:*:*:*:*", "matchCriteriaId": "8371359A-BCB7-40E6-BE71-16E107288E49", "versionEndExcluding": "2023.2.4", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:datagrip:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B2E54A2-FCAF-451D-87D2-70F9D4DC5C5F", "versionEndExcluding": "2023.3.5", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:datagrip:*:*:*:*:*:*:*:*", "matchCriteriaId": "198ED5D0-C88D-4AFA-9E15-9934C66650F6", "versionEndExcluding": "2024.1.4", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:dataspell:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD714D72-765A-4C2B-A1EA-ED79681DF0A1", "versionEndExcluding": "2023.1.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:dataspell:*:*:*:*:*:*:*:*", "matchCriteriaId": "04D60572-17BB-4F5C-96E2-41482F0312DA", "versionEndExcluding": "2023.2.7", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:dataspell:*:*:*:*:*:*:*:*", "matchCriteriaId": "249CCE69-467E-4181-B114-4BE2566CFAC4", "versionEndExcluding": "2023.3.6", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:dataspell:*:*:*:*:*:*:*:*", "matchCriteriaId": "2523C4F3-39A5-4FCA-90CA-3B121460733B", "versionEndExcluding": "2024.1.2", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:goland:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF8C3F6C-4CAD-4AFC-9625-7CDD5AB2472E", "versionEndExcluding": "2023.1.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:goland:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7FA39DB-F6A1-4213-A0BF-37A1FFC56CF2", "versionEndExcluding": "2023.2.7", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:goland:*:*:*:*:*:*:*:*", "matchCriteriaId": "91F7AE04-C3B2-4700-89C2-64FFD59C313B", "versionEndExcluding": "2023.3.7", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:goland:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB43612E-FD6C-4220-8B11-336B4F2AF1ED", "versionEndExcluding": "2024.1.3", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B29A0AC-82A9-4E3B-A425-CE60024A0B2B", "versionEndExcluding": "2023.1.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "3284FF4C-73B4-41B8-8F68-AF8DD234DDB6", "versionEndExcluding": "2023.2.7", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "39D4B44F-9182-437D-8E69-FDE818F7921B", "versionEndExcluding": "2023.3.7", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBF21B58-29E9-4446-A27A-BB12C7C311E9", "versionEndExcluding": "2024.1.3", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:mps:*:*:*:*:*:*:*:*", "matchCriteriaId": "B284C2E0-4CE1-49BA-9AEF-8B0B5D6CB33C", "versionEndExcluding": "2023.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:mps:2023.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1342D0F0-35E1-42B6-8D0B-95D2C6E5E348", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:phpstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FC207EA-07BE-403B-B759-900F3EE90272", "versionEndExcluding": "2023.1.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:phpstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "71DF05BF-A5E6-4BCF-B806-BD4E73D4D903", "versionEndExcluding": "2023.2.6", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:phpstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "61A47B15-DA71-48AE-8AA0-B9BA68F20AFC", "versionEndExcluding": "2023.3.7", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:phpstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "07D8FF11-75BC-4802-8414-7A132D929040", "versionEndExcluding": "2024.1.3", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:pycharm:*:*:*:*:*:*:*:*", "matchCriteriaId": "21BB4064-431B-4D86-9C48-D2AC47E37226", "versionEndExcluding": "2023.1.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:pycharm:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD2CF5D2-0BC4-43F2-BC49-CB3F3641B9E1", "versionEndExcluding": "2023.2.7", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:pycharm:*:*:*:*:*:*:*:*", "matchCriteriaId": "394B00FC-FBA7-40FE-8082-28C662692ECB", "versionEndExcluding": "2023.3.6", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:pycharm:*:*:*:*:*:*:*:*", "matchCriteriaId": "C55365AC-1F86-4EDF-BB75-0AD048E6BE21", "versionEndExcluding": "2024.1.3", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B5658AA-5223-4E63-BB1F-9584C614CBE6", "versionEndExcluding": "2023.1.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DC318D9-7713-42E1-BD17-B3A569F356EF", "versionEndExcluding": "2023.2.5", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5525193-53E0-42B5-87CD-DDABBFBCBD99", "versionEndExcluding": "2023.3.6", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*", "matchCriteriaId": "E62FF44C-C639-4751-A512-9A88E7D16982", "versionEndExcluding": "2024.1.3", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*", "matchCriteriaId": "C88E44A7-4F55-47DD-8B45-33FA50FF4D92", "versionEndExcluding": "2023.1.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*", "matchCriteriaId": "017D5DBB-AD63-4B95-86BD-A1425EB4D881", "versionEndExcluding": "2023.2.7", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*", "matchCriteriaId": "091F7E8D-18F9-47BA-9DC9-96245DF10789", "versionEndExcluding": "2023.3.7", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*", "matchCriteriaId": "34DC255F-9ECC-4B41-A8BA-0F70792823A3", "versionEndExcluding": "2024.1.3", "versionStartIncluding": "2024.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:rustrover:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EA65266-C23F-403C-AD23-59096B41AD58", "versionEndExcluding": "2024.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6367B0C-9050-4BDC-9D26-80C251FC3270", "versionEndExcluding": "2023.1.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA57E3D7-80D1-420F-9FA7-2D503626027F", "versionEndExcluding": "2023.2.7", "versionStartIncluding": "2023.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D60460C9-6913-441E-99BE-19EB4459836F", "versionEndExcluding": "2023.3.7", "versionStartIncluding": "2023.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*", "matchCriteriaId": "1720820F-2FB4-4AAC-A139-CF7C493A751A", "versionEndExcluding": "2024.1.4", "versionStartIncluding": "2024.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4" }, { "lang": "es", "value": "El token de acceso de GitHub podr\u00eda estar expuesto a sitios de terceros en los IDE de JetBrains posteriores a la versi\u00f3n 2023.1 y anteriores a: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4 " } ], "id": "CVE-2024-37051", "lastModified": "2024-11-21T09:23:06.323", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.8, "source": "cve@jetbrains.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-06-10T16:15:16.713", "references": [ { "source": "cve@jetbrains.com", "url": "https://security.netapp.com/advisory/ntap-20240705-0004/" }, { "source": "cve@jetbrains.com", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20240705-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "sourceIdentifier": "cve@jetbrains.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "cve@jetbrains.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-01 16:15
Modified
2024-11-21 04:27
Severity ?
Summary
JetBrains Rider before 2019.1.2 was using an unsigned JetBrains.Rider.Unity.Editor.Plugin.Repacked.dll file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BE0AFAB-336F-4D4F-916B-FCD7EF4BD3F5", "versionEndExcluding": "2019.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "JetBrains Rider before 2019.1.2 was using an unsigned JetBrains.Rider.Unity.Editor.Plugin.Repacked.dll file." }, { "lang": "es", "value": "JetBrains Rider versiones anteriores a 2019.1.2, estaba usando un archivo JetBrains.Rider.Unity.Editor.Plugin.Repacked.dll sin firmar." } ], "id": "CVE-2019-14960", "lastModified": "2024-11-21T04:27:46.790", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-01T16:15:11.170", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-06 10:15
Modified
2024-11-21 09:00
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
In JetBrains Rider before 2023.3.3 logging of environment variables containing secret values was possible
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F457E78-614D-4352-AA4C-3BA7CF826CC7", "versionEndExcluding": "2023.3.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Rider before 2023.3.3 logging of environment variables containing secret values was possible" }, { "lang": "es", "value": "En JetBrains Rider antes de 2023.3.3 era posible el registro de variables de entorno que conten\u00edan valores secretos" } ], "id": "CVE-2024-24939", "lastModified": "2024-11-21T09:00:01.210", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "cve@jetbrains.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-06T10:15:10.603", "references": [ { "source": "cve@jetbrains.com", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" } ], "sourceIdentifier": "cve@jetbrains.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "cve@jetbrains.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }