Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-30005: JetBrains Security Bulletin Q1 2021 | JetBrains News

In JetBrains PyCharm before 2020.3.4, local code execution was possible because of insufficient checks when getting the project from VCS.

CVE
#xss#web#windows#js#git#intel#rce#perl#ssrf#auth

JetBrains News Security

JetBrains Security Bulletin Q1 2021

In the first quarter of 2021, we resolved a number of security issues in our products. Here’s a summary report that contains a description of each issue and the version in which it was resolved.

Product

Description

Severity

Resolved in

CVE/CWE

Code With Me

A client could execute code in read-only mode (CWM-1235)

Medium

Compatible IDEs 2021.1 version

CVE-2021-31899

Code With Me

A client could open a browser on the host (CWM-1769)

Low

Compatible IDEs 2021.1 version

CVE-2021-31900

Exception Analyzer

No throttling on the Exception Analyzer login page. Reported by Ashhad Ali (EXA-760)

Low

Not applicable

Not applicable

IntelliJ IDEA

XXE in License server functionality. Reported by Reef Spektor (IDEA-260143)

High

2020.3.3

CVE-2021-30006

IntelliJ IDEA

Code execution without user confirmation was possible for untrusted projects (IDEA-260911, IDEA-260912, IDEA-260913, IDEA-261846, IDEA-261851, IDEA-262917, IDEA-263981, IDEA-264782)

Medium

2020.3.3

CVE-2021-29263

IntelliJ IDEA

Possible DoS. Reported by Arun Malik (IDEA-261832)

Medium

2021.1

CVE-2021-30504

JetBrains Academy

Potential takeover of a future account with a known email address. Reported by Vansh Devgan (JBA-110)

Low

Not applicable

Not applicable

JetBrains Account

Sensitive account URLs were shared with third parties. Reported by Vikram Naidu (JPF-11338)

High

2021.02

Not applicable

JetBrains Websites

Reflected XSS at blog.jetbrains.com. Reported by Peter Af Geijerstam and Jai Kumar (JS-14554, JS-14562)

Low

Not applicable

Not applicable

Hub

Two-factor authentication wasn’t enabled properly for the “All Users” group (JPS-10694)

Low

2021.1.13079

CVE-2021-31901

YouTrack

Stored XSS via attached file. Reported by Mikhail Klyuchnikov (JT-62530)

Medium

2020.6.6441

CVE-2021-27733

YouTrack

Pull request title was insufficiently sanitized (JT-62556)

Medium

2021.1.9819

CVE-2021-31903

YouTrack

Improper access control while exporting issues (JT-62649)

High

2020.6.6600

CVE-2021-31902

YouTrack

Information disclosure in issue preview. Reported by Philip Wedemann (JT-62919)

High

2020.6.8801

CVE-2021-31905

PyCharm

Code execution without user confirmation was possible for untrusted projects. Reported by Tony Torralba (PY-41524)

Medium

2020.3.4

CVE-2021-30005

Space

Insufficient CRLF sanitization in user input (SPACE-13955)

Low

Not applicable

Not applicable

TeamCity Cloud

Potential information disclosure via EC2 instance metadata (TCC-174, TCC-176)

Low

Not applicable

Not applicable

TeamCity Cloud

Temporary credentials disclosure via command injection. Reported by Chris Moore (TCC-196)

Major

Not applicable

Not applicable

TeamCity

Potential XSS on the test history page (TW-67710)

Medium

2020.2.2

CVE-2021-31904

TeamCity

TeamCity IntelliJ Plugin DOS. Reported by Jonathan Leitschuh (TW-69070)

Low

2020.2.2

CVE-2021-26310

TeamCity

Local information disclosure via a temporary file in the TeamCity IntelliJ Plugin. Reported by Jonathan Leitschuh (TW-69420)

Low

2020.2.2

CVE-2021-26309

YouTrack

Insufficient audit when an administrator uploads a file (TW-69511)

Low

2020.2.2

CVE-2021-31906

TeamCity

Improper permission checks for changing TeamCity plugins (TW-69521)

Low

2020.2.2

CVE-2021-31907

TeamCity

Potential XSS on the test page. Reported by Stephen Patches (TW-69737)

Low

2020.2.2

CVE-2021-3315

TeamCity

Argument injection leading to RCE (TW-70054)

High

2020.2.3

CVE-2021-31909

TeamCity

Stored XSS on several pages (TW-70078, TW-70348)

Medium

2020.2.3

CVE-2021-31908

TeamCity

Information disclosure via SSRF (TW-70079)

High

2020.2.3

CVE-2021-31910

TeamCity

Reflected XSS on several pages (TW-70093, TW-70094, TW-70095, TW-70096, TW-70137)

Medium

2020.2.3

CVE-2021-31911

TeamCity

Potential account takeover during password reset (TW-70303)

Medium

2020.2.3

CVE-2021-31912

TeamCity

Insufficient checks of the redirect_uri during GitHub SSO token exchange (TW-70358)

Low

2020.2.3

CVE-2021-31913

TeamCity

Arbitrary code execution on TeamCity Server running on Windows. Reported by Chris Moore (TW-70512)

High

2020.2.4

CVE-2021-31914

TeamCity

Command injection leading to RCE. Reported by Chris Moore (TW-70541)

High

2020.2.4

CVE-2021-31915

Upsource

Application passwords were not revoked correctly. Reported by Thibaut Zonca (UP-10843)

High

2020.1.1883

CVE-2021-30482

WebStorm

HTTP requests were used instead of HTTPS (WEB-49549)

Low

2021.1

CVE-2021-31898

WebStorm

Code execution without user confirmation was possible for untrusted projects (WEB-49689, WEB-49902)

Low

2021.1

CVE-2021-31897

If you need any further assistance, please contact our Security Team.

Subscribe to receive the bulletin in your mailbox.

Your JetBrains Team_
The Drive to Develop_

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907