Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-24329: JetBrains Security Bulletin Q4 2021 | Company Blog

In JetBrains Kotlin before 1.6.0, it was not possible to lock dependencies for Multiplatform Gradle Projects.

CVE
#sql#xss#csrf#vulnerability#web#git#java#intel#ssrf#auth#gradle#kotlin

JetBrains Security

JetBrains Security Bulletin Q4 2021

In the fourth quarter of 2021, we resolved a number of security issues in our products. Here’s a summary report that contains a description of each issue and the version in which it was resolved.

Product

Description

Severity

Resolved in

CVE/CWE

Datalore

Another user’s database could be attached (DL-9779)

High

Not applicable

Not applicable

Hub

JetBrains Account integration exposed API keys with excessive permissions. Reported by Yurii Sanin (HUB-10958)

High

2021.1.13890

CVE-2022-24327

Hub

An unprivileged user could perform a DoS. Reported by Yurii Sanin (HUB-10976)

High

2021.1.13956

CVE-2022-24328

IntelliJ IDEA

Code could be executed without the user’s permission on opening a project (IDEA-243002, IDEA-277306, IDEA-282396, IDEA-275917)

Medium

2021.2.4

CVE-2022-24345

IntelliJ IDEA

Potential LCE via RLO (Right-to-Left Override) characters (IDEA-284150)

Medium

2021.3.1

CVE-2022-24346

JetBrains Blog

Blind SQL injection. Reported by Khan Janny (BLOG-45)

Medium

Not applicable

Not applicable

Kotlin

No ability to lock dependencies for Kotlin Multiplatform Gradle projects. Reported by Carter Jernigan (KT-49449)

Medium

1.6.0

CVE-2022-24329

Kotlin websites

Clickjacking at kotlinlang.org (KTL-588)

Medium

Not applicable

Not applicable

Remote Development

Unexpected open port on backend server. Please refer to this blog post for additional details. Reported by Damian Gwiżdż (GTW-894)

High

Not 2021.3.1

CVE-2021-45977

Space

Missing permission check in an HTTP API response (SPACE-15991)

High

Not applicable

Not applicable

TeamCity

A redirect to an external site was possible (TW-71113)

Low

2021.2.1

CVE-2022-24330

TeamCity

Logout failed to remove the “Remember Me” cookie (TW-72969)

Low

2021.2

CVE-2022-24332

TeamCity

GitLab authentication impersonation. Reported by Christian Pedersen (TW-73375)

High

2021.1.4

CVE-2022-24331

TeamCity

The “Agent push” feature allowed any private key on the server to be selected (TW-73399)

Low

2021.2.1

CVE-2022-24334

TeamCity

Blind SSRF via an XML-RPC call. Reported by Artem Godin (TW-73465)

Medium

2021.2

CVE-2022-24333

TeamCity

Time-of-check/Time-of-use (TOCTOU) vulnerability in agent registration via XML-RPC. Reported by Artem Godin (TW-73468)

High

2021.2

CVE-2022-24335

TeamCity

An unauthenticated attacker could cancel running builds via an XML-RPC request to the TeamCity server. Reported by Artem Godin (TW-73469)

Medium

2021.2.1

CVE-2022-24336

TeamCity

Pull-requests’ health items were shown to users without appropriate permissions (TW-73516)

Low

2021.2

CVE-2022-24337

TeamCity

Stored XSS. Reported by Yurii Sanin (TW-73737)

Medium

2021.2.1

CVE-2022-24339

TeamCity

URL injection leading to CSRF. Reported by Yurii Sanin (TW-73859)

Medium

2021.2.1

CVE-2022-24342

TeamCity

Changing a password failed to terminate sessions of the edited user (TW-73888)

Low

2021.2.1

CVE-2022-24341

TeamCity

XXE during the parsing of a configuration file (TW-73932)

Medium

2021.2.1

CVE-2022-24340

TeamCity

Reflected XSS (TW-74043)

Medium

2021.2.1

CVE-2022-24338

TeamCity

Stored XSS on the Notification templates page (JT-65752))

Low

2021.4.31698

CVE-2022-24344

YouTrack

A custom logo could be set with read-only permissions (JT-66214)

Low

2021.4.31698

CVE-2022-24343

YouTrack

Stored XSS via project icon. Reported by Yurii Sanin (JT-67176)

Medium

2021.4.36872

CVE-2022-24347

If you need any further assistance, please contact our Security Team.

Subscribe to receive the bulletin in your mailbox.

Your JetBrains Team_
The Drive to Develop_

Subscribe to Blog updates

Related news

CVE-2023-22130: Oracle Critical Patch Update Advisory - October 2023

Vulnerability in the Sun ZFS Storage Appliance product of Oracle Systems (component: Core). The supported version that is affected is 8.8.60. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).

CVE-2023-21850: Oracle Critical Patch Update Advisory - January 2023

Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

CVE-2022-21586: Oracle Critical Patch Update Advisory - July 2022

Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).

CVE-2022-21496: Oracle Critical Patch Update Advisory - April 2022

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service ...

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907