The JetBrains Security Blog | The JetBrains Blog https://blog.jetbrains.com Developer Tools for Professionals and Teams Tue, 09 Aug 2022 16:16:39 +0000 en-US hourly 1 https://blog.jetbrains.com/wp-content/uploads/2023/02/cropped-icon-512-32x32.png The JetBrains Security Blog | The JetBrains Blog https://blog.jetbrains.com 32 32 Security Bulletin Changes https://blog.jetbrains.com/security/2022/04/security-bulletin-changes/ Mon, 18 Apr 2022 10:30:37 +0000 https://blog.jetbrains.com/?post_type=security&p=240871 At JetBrains, we do our best to make sure our software is free of vulnerabilities. If we encounter a security problem or if external researchers alert us to one, we follow our Coordinated Disclosure Policy to address the issue. As a part of this process, we share information about vulnerabilities publicly to encourage our customers to update JetBrains products to new versions with the appropriate fixes.
For the last several years, we have published the JetBrains Security Bulletin on our blog and sent emails to Bulletin subscribers quarterly. However, this approach created an unwanted delay between the release of new versions and the publication of information about vulnerabilities. We also receive a lot of questions about vulnerable product versions from our customers.

New page with all fixed security issues

To help you answer these questions, we’ve created a page with information about fixed security issues. It contains information about all of the vulnerabilities that we’ve ever resolved, across all JetBrains products and services. Similar to the Security Bulletin, you’ll find the issue description, fix version, CWE (Common Weakness Enumeration) ID, and assigned CVE (if applicable) for each issue. We’ve also added the ability to filter the results, so you can review only the issues relevant to the product you are interested in. 

We plan to add information about fixed security issues to the page when new product versions are released, so you’ll be able to learn about security updates for JetBrains products faster than before.

Emails will be sent monthly

For those who receive the Bulletin via email, the process will remain mostly the same but with just one change: we will create our digest of fixed issues monthly instead of quarterly. If you are already subscribed, no action is needed from your side. If you want to subscribe, please do so here.

JetBrains becomes a CNA

One more thing to report is that JetBrains has been authorized by the CVE Program as a CVE Numbering Authority (CNA). A CNA is an organization responsible for the regular assignment of CVE IDs to vulnerabilities, and for creating and publishing information about the vulnerabilities in the associated CVE Records. Each CNA has a specific scope of responsibility for vulnerability identification and publishing.

Once we discover a security issue in a JetBrains product, we always add information about the issue to the CVE List to provide consistent descriptions of vulnerabilities. Information technology and cybersecurity professionals use CVE Records to ensure they are discussing the same issue, and to coordinate their efforts to prioritize and address the vulnerabilities.  

As a CNA, JetBrains will be able to:

  • Assign CVE IDs for issues discovered in JetBrains products faster.
  • Provide the most accurate information for the CVE list (description, impact, and root cause).

If you have any questions about our approach, please feel free to get in touch with us at security@jetbrains.com.

Stay safe,

The JetBrains team

]]>
SpringShell Vulnerability in JetBrains Products and Services https://blog.jetbrains.com/security/2022/04/springshell-vulnerability-in-jetbrains-products-and-services/ Fri, 08 Apr 2022 10:27:39 +0000 https://blog.jetbrains.com/?post_type=security&p=238447 What happened

On March 29, 2022, we became aware of the Remote Code Execution vulnerabilities CVE-2022-22963 and CVE-2022-22965 in several libraries of the Spring Framework, which is commonly used in web applications.

Our response

Together with the product teams we ran an audit of JetBrains web applications, including the products: YouTrack, Hub, TeamCity, Space, Datalore, and services: JetBrains Website and JetBrains Account.

None of the applications listed above use vulnerable versions of Spring or they don’t meet known exploitation criteria and are therefore not affected by the discovered security issues. Please refer to the following technical discussions concerning TeamCity, Hub, and YouTrack.

Other JetBrains products, including all IntelliJ Platform IDEs, .NET tools, Toolbox App, Code With Me, JetBrains Gateway, Kotlin, and Ktor are not affected by the issues as they are not web applications using the Spring Framework.

We will continue monitoring any further developments with these vulnerabilities.

We will also continue to test our products and services for security issues resulting from the use of third-party components, and update the versions of any such components as and when appropriate fixes become available. 

Stay safe,

The JetBrains team

]]>
JetBrains Security Bulletin Q4 2021 https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/ Tue, 08 Feb 2022 07:35:18 +0000 https://blog.jetbrains.com/wp-content/uploads/2020/08/JetBrains-Security-Bulletin_Image_1280h8001597315970333.png https://blog.jetbrains.com/?post_type=blog&p=226260 In the fourth quarter of 2021, we resolved a number of security issues in our products. Here’s a summary report that contains a description of each issue and the version in which it was resolved.

Product Description Severity Resolved in CVE/CWE
Datalore Another user’s database could be attached (DL-9779) High Not applicable Not applicable
Hub JetBrains Account integration exposed API keys with excessive permissions. Reported by Yurii Sanin (HUB-10958) High 2021.1.13890 CVE-2022-24327
Hub An unprivileged user could perform a DoS. Reported by Yurii Sanin (HUB-10976) High 2021.1.13956 CVE-2022-24328
IntelliJ IDEA Code could be executed without the user’s permission on opening a project (IDEA-243002, IDEA-277306, IDEA-282396, IDEA-275917) Medium 2021.2.4 CVE-2022-24345
IntelliJ IDEA Potential LCE via RLO (Right-to-Left Override) characters (IDEA-284150) Medium 2021.3.1 CVE-2022-24346
JetBrains Blog Blind SQL injection. Reported by Khan Janny (BLOG-45) Medium Not applicable Not applicable
Kotlin No ability to lock dependencies for Kotlin Multiplatform Gradle projects. Reported by Carter Jernigan (KT-49449) Medium 1.6.0 CVE-2022-24329
Kotlin websites Clickjacking at kotlinlang.org (KTL-588) Medium Not applicable Not applicable
Remote Development Unexpected open port on backend server. Please refer to this blog post for additional details. Reported by Damian Gwiżdż (GTW-894) High Not 2021.3.1 CVE-2021-45977
Space Missing permission check in an HTTP API response (SPACE-15991) High Not applicable Not applicable
TeamCity A redirect to an external site was possible (TW-71113) Low 2021.2.1 CVE-2022-24330
TeamCity Logout failed to remove the “Remember Me” cookie (TW-72969) Low 2021.2 CVE-2022-24332
TeamCity GitLab authentication impersonation. Reported by Christian Pedersen (TW-73375) High 2021.1.4 CVE-2022-24331
TeamCity The “Agent push” feature allowed any private key on the server to be selected (TW-73399) Low 2021.2.1 CVE-2022-24334
TeamCity Blind SSRF via an XML-RPC call. Reported by Artem Godin (TW-73465) Medium 2021.2 CVE-2022-24333
TeamCity Time-of-check/Time-of-use (TOCTOU) vulnerability in agent registration via XML-RPC. Reported by Artem Godin (TW-73468) High 2021.2 CVE-2022-24335
TeamCity An unauthenticated attacker could cancel running builds via an XML-RPC request to the TeamCity server. Reported by Artem Godin (TW-73469) Medium 2021.2.1 CVE-2022-24336
TeamCity Pull-requests’ health items were shown to users without appropriate permissions (TW-73516) Low 2021.2 CVE-2022-24337
TeamCity Stored XSS. Reported by Yurii Sanin (TW-73737) Medium 2021.2.1 CVE-2022-24339
TeamCity URL injection leading to CSRF. Reported by Yurii Sanin (TW-73859) Medium 2021.2.1 CVE-2022-24342
TeamCity Changing a password failed to terminate sessions of the edited user (TW-73888) Low 2021.2.1 CVE-2022-24341
TeamCity XXE during the parsing of a configuration file (TW-73932) Medium 2021.2.1 CVE-2022-24340
TeamCity Reflected XSS (TW-74043) Medium 2021.2.1 CVE-2022-24338
TeamCity Stored XSS on the Notification templates page (JT-65752)) Low 2021.4.31698 CVE-2022-24344
YouTrack A custom logo could be set with read-only permissions (JT-66214) Low 2021.4.31698 CVE-2022-24343
YouTrack Stored XSS via project icon. Reported by Yurii Sanin (JT-67176) Medium 2021.4.36872 CVE-2022-24347

If you need any further assistance, please contact our Security Team.

Subscribe to receive the bulletin in your mailbox.

Your JetBrains Team
The Drive to Develop

]]>
Important Security Update for JetBrains Gateway https://blog.jetbrains.com/blog/2021/12/30/important-security-update-for-jetbrains-gateway/ Thu, 30 Dec 2021 18:22:46 +0000 https://blog.jetbrains.com/?post_type=blog&p=216317

On December 27, 2021, we became aware of a security issue that exposes certain JetBrains Remote Development backend IDEs to the networks the server is connected to. This was a result of misconfiguration on our side.

The following IDEs were affected:

  • IntelliJ IDEA 2021.3.1 Preview (213.6461.21) and IntelliJ IDEA 2021.3.1 RC (213.6461.48)
  • PyCharm Professional 2021.3.1 RC (213.6461.6)
  • GoLand 2021.3.1 (213.6461.23)
  • PhpStorm 2021.3.1 Preview (213.6461.28) and PhpStorm 2021.3.1 RC (213.6461.58)
  • RubyMine 2021.3.1 Preview (213.6461.24) and RubyMine 2021.3.1 RC (213.6461.46)
  • CLion 2021.3.1 (213.6461.46)
  • WebStorm 2021.3.1 Preview (213.6461.19) and WebStorm 2021.3.1 RC (213.6461.38)

Users who initially configured their backend IDEs within the date ranges specified below are most likely affected:

  • IntelliJ IDEA: Dec 16–29, 2021
  • PyCharm Professional: Dec 15–30, 2021
  • GoLand: Dec 20–30, 2021
  • PhpStorm: Dec 17–30, 2021
  • RubyMine: Dec 16–29, 2021
  • CLion: Dec 22–29,2021
  • WebStorm: Dec 16–29, 2021

If you configured the backend IDEs before the dates above and you have not updated them, you should be safe. However, we recommend checking your backend IDE version just to make sure.

Actions we’ve taken

We fixed the issue on Dec 27, 2021 and we have released the following updates with the fix:

  • IntelliJ IDEA 2021.3.1 (213.6461.79)
  • PyCharm Professional 2021.3.1 (213.6461.77)
  • GoLand 2021.3.2 (213.6461.81)
  • PhpStorm 2021.3.1 (213.6461.83)
  • RubyMine 2021.3.1 (213.6461.75)
  • CLion 2021.3.2 (213.6461.75)
  • WebStorm 2021.3.1 (213.6461.79)

Actions you should take

If you use JetBrains Gateway with one of the vulnerable IDEs listed above as a backend for Remote development, please update to the fixed version of the corresponding IDE. If it is not possible for you to upgrade, please make sure that the environment variable ORG_JETBRAINS_PROJECTOR_SERVER_ENABLE_WS_SERVER=false is being set upon each launch of the Remote Development Server. This usually implies adding the line export ORG_JETBRAINS_PROJECTOR_SERVER_ENABLE_WS_SERVER=false  to the login shell profile of the user that is used to launch the server. Please make sure that the server is restarted after setting the variable. 

We sincerely apologize for what has happened. Please rest assured that we are taking steps to avoid this issue from occurring again in the future. 

If you need any further assistance, please contact support@jetbrains.com or simply comment on this post.

]]>
https://blog.jetbrains.com/zh-hans/blog/2021/12/30/important-security-update-for-jetbrains-gateway/ https://blog.jetbrains.com/ru/blog/2021/12/30/important-security-update-for-jetbrains-gateway/ https://blog.jetbrains.com/ko/blog/2021/12/30/important-security-update-for-jetbrains-gateway/ https://blog.jetbrains.com/fr/blog/2021/12/30/important-security-update-for-jetbrains-gateway/
Log4j vulnerability and JetBrains Products and Services https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/ Mon, 13 Dec 2021 19:04:13 +0000 https://blog.jetbrains.com/?post_type=blog&p=212756 What happened

Similar to the rest of the industry, we became aware on the 10th of December 2021 of the Remote Code Execution vulnerability CVE-2021-44228 in the popular Java logging library log4j (all versions between 2.0 and 2.14.1 are vulnerable). We immediately took action to mitigate any potential impacts on our applications and systems. We’d like to provide you with an update.

Actions we’ve taken

We have run an audit of the applications that use log4j and have upgraded to 2.15.0 where necessary. Following is the list of already audited products and their status:

  • All IntelliJ platform based IDEs – Not affected.
  • All .NET tools – Not affected.
  • Toolbox – Not affected.
  • TeamCity – Not affected. Investigation details: TW-74298
  • Hub – Fix was released in version #2021.1.14063 on 13th of December 2021. Please check updates below.
  • YouTrack Standalone – Fix was released in version #2021.4.35970 on 14th of December 2021. Details for both Hub and YouTrack: JT-67582. Please check updates below.
  • YouTrack InCloud – Fix was released on 10th of December 2021.
  • Datalore – Not affected.
  • Space – Not affected.
  • Code With Me – Fix was released on 13th of December 2021 (only jitsi which is used for calls was affected).
  • Gateway – Not affected.
  • Kotlin – Not affected.
  • Ktor – Not affected.
  • MPS – Not affected. 
  • JetBrains Account – Fix was released on 10th of December 2021.
  • Floating license server – Fix was released in version #30211 on 11th of December 2021.
  • Upsource – Fix was released in version #2020.1.1952 on 13th of December 2021.

We are continuing to test our services to see whether they are vulnerable, as a result of using third party components, and if/where applicable, take the necessary actions. We are also monitoring further development of the story.

Actions you should take

If you are a user of YouTrack Standalone, Hub, Upsource, or Floating license server, please make sure you have either updated to the newly released versions or restarted the services with the -Dlog4j2.formatMsgNoLookups=true JVM parameter.

Update 14th December 2021 – 18:25 CET
Administrators of YouTrack Standalone and Hub installations must take further action to secure their instances. Please please refer to the YouTrack and Hub blog posts for further details. Also, the Hub release was in 2021.1.14080 as opposed to 2021.1.14063 listed above.

JetBrains Team

]]>
JetBrains Security Bulletin Q3 2021 https://blog.jetbrains.com/blog/2021/11/08/jetbrains-security-bulletin-q3-2021/ Mon, 08 Nov 2021 11:09:29 +0000 https://blog.jetbrains.com/wp-content/uploads/2020/08/JetBrains-Security-Bulletin_Image_1280h8001597315970333.png https://blog.jetbrains.com/?post_type=blog&p=200217 In the third quarter of 2021, we resolved a number of security issues in our products. Here’s a summary report that contains a description of each issue and the version in which it was resolved.

Product Description Severity Resolved in CVE/CWE
Datalore Server version disclosure. Reported by Bharat (DL-9447) Low Not applicable Not applicable
Hub Information disclosure via avatar metadata (HUB-10154) Low 2021.1.13690 CVE-2021-43180
Hub Potential DOS via user information. Reported by Bharat (HUB-10804) Low 2021.1.13415 CVE-2021-43182
Hub Stored XSS. Reported by Dmitry Sherstoboev (HUB-10854) Medium 2021.1.13690 CVE-2021-43181
Hub Authentication throttling mechanism could be bypassed. Reported by Bharat (HUB-10869) Medium 2021.1.13690 CVE-2021-43183
JetBrains Account Authentication throttling mechanism could be bypassed. Reported by Bharat (JPF-11933) Medium 2021.07 Not applicable
Ktor Improper nonce verification during the OAuth2 authentication process. Reported by Ole Schilling Tjensvold (KTOR-3091) Medium 1.6.4 CVE-2021-43203
Space Authentication throttling mechanism could be bypassed. Reported by Bharat (SPACE-15282) Low Not applicable Not applicable
Space SSRF disclosing EC2 metadata (SPACE-15666) High Not applicable Not applicable
TeamCity Cloud Session takeover using an open redirect in OAuth integration. Reported by Yurii Sanin (TCC-277) High Not applicable Not applicable
TeamCity User enumeration was possible (TW-70167) Low 2021.1.2 CVE-2021-43194
TeamCity RCE in agent push functionality. Reported by Eduardo Castellanos (TW-70384) High 2021.1.2 CVE-2021-43193
TeamCity Information disclosure via the Docker Registry connection dialog (TW-70459) Medium 2021.1 CVE-2021-43196
TeamCity Some HTTP security headers were missing (TW-71376) Low 2021.1.2 CVE-2021-43195
TeamCity Email notifications could include unescaped HTML (TW-71981) Low 2021.1.2 CVE-2021-43197
TeamCity Insufficient permissions checks in create patch functionality (TW-71982) Low 2021.1.2 CVE-2021-43199
TeamCity Stored XSS (TW-72007) Low 2021.1.2 CVE-2021-43198
TeamCity Insufficient permissions checks in agent push functionality (TW-72177) Low 2021.1.2 CVE-2021-43200
TeamCity X-Frame-Options header was missing in some cases (TW-72464) Low 2021.1.3 CVE-2021-43202
TeamCity A newly created project could take settings from a deleted project (TW-72521) Medium 2021.1.3 CVE-2021-43201
YouTrack Mobile Client-side caching on iOS (YTM-12961) Low 2021.2 CVE-2021-43187
YouTrack Mobile Incomplete access tokens protection on iOS (YTM-12962, YTM-12965, YTM-12966) Low 2021.2 CVE-2021-43188
YouTrack Mobile Incomplete access tokens protection on Android (YTM-12964) Low 2021.2 CVE-2021-43189
YouTrack Mobile Task hijacking on Android (YTM-12967) Low 2021.2 CVE-2021-43190
YouTrack Mobile iOS URL scheme hijacking (YTM-12968) Low 2021.2 CVE-2021-43192
YouTrack Mobile Missing security screen on Android and iOS (YTM-12969) Low 2021.2 CVE-2021-43191
YouTrack Stored XSS (JT-63483) Low 2021.3.21051 CVE-2021-43184
YouTrack Unsafe EC2 configuration in YouTrack InCloud (JT-63693, JT-63695) Low Not applicable Not applicable
YouTrack Host header injection. Reported by Artem Ivanov (JT-65590) Medium 2021.3.23639 CVE-2021-43185
YouTrack Stored XSS. Reported by Artem Ivanov (JT-65749) High 2021.3.24402 CVE-2021-43186

If you need any further assistance, please contact our Security Team.

Subscribe to receive the bulletin in your mailbox.

Your JetBrains Team
The Drive to Develop

]]>
JetBrains Security Bulletin Q2 2021 https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/ Thu, 05 Aug 2021 08:02:11 +0000 https://blog.jetbrains.com/wp-content/uploads/2020/08/JetBrains-Security-Bulletin_Image_1280h8001597315970333.png https://blog.jetbrains.com/?post_type=blog&p=170636 In the second quarter of 2021, we resolved a number of security issues in our products. Here’s a summary report that contains a description of each issue and the version in which it was resolved.

Product Description Severity Resolved in CVE/CWE
Datalore Potential JWT token takeover using a redirect misconfiguration. Reported by Yurii Sanin (DL-9225, JPF-11801) High Not applicable Not applicable
Datalore There was no way to drop all active sessions. Reported by Bharat (DL-9247) High Not applicable Not applicable
JetBrains Account OTP could be used several times after a successful validation (JPF-11119) Low 2021.04 Not applicable
JetBrains Account Potential account takeover via OAuth integration. Reported by Bharat (JPF-11802) High 2021.06 Not applicable
JetBrains Websites Reflected XSS on jetbrains.com. Reported by Vasu Solanki (JS-14004) Low Not applicable Not applicable
Hub Potentially insufficient CSP for the Widget deployment feature (JPS-10736) Low 2021.1.13262 CVE-2021-37540
Hub Account takeover was possible during password reset. Reported by PetrusViet (a member of VNG Security) (JPS-10767) High 2021.1.13389 CVE-2021-36209
Hub HTML injection in the password reset email was possible. Reported by Bharat (JPS-10797) Medium 2021.1.13402 CVE-2021-37541
RubyMine Code execution without user confirmation was possible for untrusted projects (RUBY-27702) Medium 2021.1.1 CVE-2021-37543
Space Deprecated organization-wide package repositories were publicly visible (SPACE-14151) High Not applicable Not applicable
TeamCity Potential XSS (TW-61688) High 2020.2.3 CVE-2021-37542
TeamCity Insecure deserialization (TW-70057, TW-70080) High 2020.2.4 CVE-2021-37544
TeamCity Insufficient authentication checks for agent requests (TW-70166) High 2021.1.1 CVE-2021-37545
TeamCity Insecure key generation for encrypted properties (TW-70201) Low 2021.1 CVE-2021-37546
TeamCity Insufficient checks while uploading files (TW-70546) Medium 2020.2.4 CVE-2021-37547
TeamCity Plain-text passwords could sometimes be stored in VCS (TW-71008) Medium 2021.1 CVE-2021-37548
YouTrack Insufficient sandboxing in workflows (JT-63222, JT-63254) Critical 2021.1.11111 CVE-2021-37549
YouTrack Time-unsafe comparisons were used (JT-63697) Low 2021.2.16363 CVE-2021-37550
YouTrack System user passwords were hashed with SHA-256 (JT-63698) Low 2021.2.16363 CVE-2021-37551
YouTrack An insecure PRNG was used (JT-63699) Low 2021.2.16363 CVE-2021-37553
YouTrack Reflected XSS on the konnector service in Firefox (JT-63702) Low Not applicable Not applicable
YouTrack Stored XSS (JT-64564) Medium 2021.2.17925 CVE-2021-37552
YouTrack Users could see boards without having the necessary permissions (JT-64634) Low 2021.3.21051 CVE-2021-37554

If you need any further assistance, please contact our Security Team.

Subscribe to receive the bulletin in your mailbox.

Your JetBrains Team
The Drive to Develop

]]>
JetBrains Security Bulletin Q1 2021 https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/ Fri, 07 May 2021 07:14:48 +0000 https://blog.jetbrains.com/wp-content/uploads/2020/08/JetBrains-Security-Bulletin_Image_1280h8001597315970333.png https://blog.jetbrains.com/?post_type=blog&p=140870 In the first quarter of 2021, we resolved a number of security issues in our products. Here’s a summary report that contains a description of each issue and the version in which it was resolved.

Product Description Severity Resolved in CVE/CWE
Code With Me A client could execute code in read-only mode (CWM-1235) Medium Compatible IDEs 2021.1 version CVE-2021-31899
Code With Me A client could open a browser on the host (CWM-1769) Low Compatible IDEs 2021.1 version CVE-2021-31900
Exception Analyzer No throttling on the Exception Analyzer login page. Reported by Ashhad Ali (EXA-760) Low Not applicable Not applicable
IntelliJ IDEA XXE in License server functionality. Reported by Reef Spektor (IDEA-260143) High 2020.3.3 CVE-2021-30006
IntelliJ IDEA Code execution without user confirmation was possible for untrusted projects (IDEA-260911, IDEA-260912, IDEA-260913, IDEA-261846, IDEA-261851, IDEA-262917, IDEA-263981, IDEA-264782) Medium 2020.3.3 CVE-2021-29263
IntelliJ IDEA Possible DoS. Reported by Arun Malik (IDEA-261832) Medium 2021.1 CVE-2021-30504
JetBrains Academy Potential takeover of a future account with a known email address. Reported by Vansh Devgan (JBA-110) Low Not applicable Not applicable
JetBrains Account Sensitive account URLs were shared with third parties. Reported by Vikram Naidu (JPF-11338) High 2021.02 Not applicable
JetBrains Websites Reflected XSS at blog.jetbrains.com. Reported by Peter Af Geijerstam and Jai Kumar (JS-14554, JS-14562) Low Not applicable Not applicable
Hub Two-factor authentication wasn’t enabled properly for the “All Users” group (JPS-10694) Low 2021.1.13079 CVE-2021-31901
YouTrack Stored XSS via attached file. Reported by Mikhail Klyuchnikov (JT-62530) Medium 2020.6.6441 CVE-2021-27733
YouTrack Pull request title was insufficiently sanitized (JT-62556) Medium 2021.1.9819 CVE-2021-31903
YouTrack Improper access control while exporting issues (JT-62649) High 2020.6.6600 CVE-2021-31902
YouTrack Information disclosure in issue preview. Reported by Philip Wedemann (JT-62919) High 2020.6.8801 CVE-2021-31905
PyCharm Code execution without user confirmation was possible for untrusted projects. Reported by Tony Torralba (PY-41524) Medium 2020.3.4 CVE-2021-30005
Space Insufficient CRLF sanitization in user input (SPACE-13955) Low Not applicable Not applicable
TeamCity Cloud Potential information disclosure via EC2 instance metadata (TCC-174, TCC-176) Low Not applicable Not applicable
TeamCity Cloud Temporary credentials disclosure via command injection. Reported by Chris Moore (TCC-196) Major Not applicable Not applicable
TeamCity Potential XSS on the test history page (TW-67710) Medium 2020.2.2 CVE-2021-31904
TeamCity TeamCity IntelliJ Plugin DOS. Reported by Jonathan Leitschuh (TW-69070) Low 2020.2.2 CVE-2021-26310
TeamCity Local information disclosure via a temporary file in the TeamCity IntelliJ Plugin. Reported by Jonathan Leitschuh (TW-69420) Low 2020.2.2 CVE-2021-26309
YouTrack Insufficient audit when an administrator uploads a file (TW-69511) Low 2020.2.2 CVE-2021-31906
TeamCity Improper permission checks for changing TeamCity plugins (TW-69521) Low 2020.2.2 CVE-2021-31907
TeamCity Potential XSS on the test page. Reported by Stephen Patches (TW-69737) Low 2020.2.2 CVE-2021-3315
TeamCity Argument injection leading to RCE (TW-70054) High 2020.2.3 CVE-2021-31909
TeamCity Stored XSS on several pages (TW-70078, TW-70348) Medium 2020.2.3 CVE-2021-31908
TeamCity Information disclosure via SSRF (TW-70079) High 2020.2.3 CVE-2021-31910
TeamCity Reflected XSS on several pages (TW-70093, TW-70094, TW-70095, TW-70096, TW-70137) Medium 2020.2.3 CVE-2021-31911
TeamCity Potential account takeover during password reset (TW-70303) Medium 2020.2.3 CVE-2021-31912
TeamCity Insufficient checks of the redirect_uri during GitHub SSO token exchange (TW-70358) Low 2020.2.3 CVE-2021-31913
TeamCity Arbitrary code execution on TeamCity Server running on Windows. Reported by Chris Moore (TW-70512) High 2020.2.4 CVE-2021-31914
TeamCity Command injection leading to RCE. Reported by Chris Moore (TW-70541) High 2020.2.4 CVE-2021-31915
Upsource Application passwords were not revoked correctly. Reported by Thibaut Zonca (UP-10843) High 2020.1.1883 CVE-2021-30482
WebStorm HTTP requests were used instead of HTTPS (WEB-49549) Low 2021.1 CVE-2021-31898
WebStorm Code execution without user confirmation was possible for untrusted projects (WEB-49689, WEB-49902) Low 2021.1 CVE-2021-31897

If you need any further assistance, please contact our Security Team.

Subscribe to receive the bulletin in your mailbox.

Your JetBrains Team
The Drive to Develop

]]>
JetBrains Security Bulletin Q4 2020 https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/ https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/#respond Wed, 03 Feb 2021 09:50:52 +0000 https://blog.jetbrains.com/wp-content/uploads/2020/08/JetBrains-Security-Bulletin_Image_1280h8001597315970333.png https://blog.jetbrains.com/?post_type=blog&p=112933 In the fourth quarter of 2020, we resolved a number of security issues in our products. Here’s a summary report that contains a description of each issue and the version in which it was resolved.

Product Description Severity Resolved in CVE/CWE
Code With Me An attacker in the local network knowing the session ID could get access to the encrypted traffic. Reported by Grigorii Liullin (CWM-1067) Low 2020.3 CVE-2021-25755
Datalore Server components versions were disclosed (DL-8327, DL-8335) Low Not applicable CWE-200
Exception Analyzer Information disclosure via the Exception Analyzer (SDP-1248) Low Not applicable CWE-200
IntelliJ IDEA HTTP links were used for several remote repositories (IDEA-228726) Low 2020.2 CVE-2021-25756
IntelliJ IDEA Potentially insecure deserialization of the workspace model (IDEA-253582) Low 2020.3 CVE-2021-25758
JetBrains Account Authorization token was sent as a query parameter within Zendesk integration (JPF-10508) Low 2020.11 CWE-598
JetBrains Account Open-redirect was possible (JPF-10660) Low 2020.10 CWE-601
JetBrains Websites Cross-origin resource sharing was possible. Reported by Ashhad Ali (SDP-1193) Low Not applicable CWE-942
JetBrains Websites Throttling was not used for a particular endpoint. Reported by Ashhad Ali (SDP-1197) Low Not applicable CWE-799
JetBrains Websites Clickjacking was possible. Reported by Ashhad Ali (SDP-1203) Low Not applicable CWE-1021
Hub Open-redirect was possible. Reported by Mohammed Amine El Attar (JPS-10348) Medium 2020.1.12629 CVE-2021-25757
Hub An authorized user could delete the 2FA settings of any other user (JPS-10410) Medium 2020.1.12629 CVE-2021-25759
Hub Information disclosure via public API (JPS-10481) Low 2020.1.12669 CVE-2021-25760
Kotlin A vulnerable Java API was used for creating temporary files and folders, which could make temporary files available for other users of a system. Reported by Jonathan Leitschuh (KT-42181) Low 1.4.21 CVE-2020-29582
Ktor Birthday attack on SessionStorage key was possible. Reported by Kenta Koyama (KTOR-878) Low 1.5.0 CVE-2021-25761
Ktor Weak cipher suites were enabled by default. Reported by Johannes Ulfkjær Jensen (KTOR-895) Low 1.4.2 CVE-2021-25763
Ktor HTTP Request Smuggling was possible. Reported by ZeddYu Lu, Kaiwen Shen, and Yaru Yang (KTOR-1116) Low 1.4.3 CVE-2021-25762
PhpStorm Source code could be added to debug logs (WI-54619) Low 2020.3 CVE-2021-25764
YouTrack CSRF via attachment upload. Reported by Yurii Sanin (JT-58157) Medium 2020.4.4701 CVE-2021-25765
YouTrack Users enumeration via the REST API without the appropriate permissions (JT-59396, JT-59498) Low 2020.4.4701 CVE-2020-25208
YouTrack Improper resource access checks (JT-59397) Low 2020.4.4701 CVE-2021-25766
YouTrack Issue’s existence disclosure via the YouTrack command execution (JT-59663) Low 2020.6.1767 CVE-2021-25767
YouTrack Improper permissions checks for attachment actions (JT-59900) Low 2020.4.4701 CVE-2021-25768
YouTrack Improper permissions checks for attachment actions (JT-59900) Low 2020.4.4701 CVE-2021-25768
YouTrack YouTrack admin wasn’t able to access attachments (JT-60824) Low 2020.4.6808 CVE-2021-25769
YouTrack Server-side template injection in YouTrack InCloud. Reported by Vasily Vasilkov (JT-61449) High 2020.5.3123 CVE-2021-25770
YouTrack Project information disclosure (JT-61566) Low 2020.6.1099 CVE-2021-25771
Space Potential information disclosure via logs (SPACE-9343, SPACE-10969) Low Not applicable CWE-532
Space An attacker could obtain limited information via SSRF while testing the connection to a mirrored repository (SPACE-9514) High Not applicable CWE-918
Space Content-Type header wasn’t set for some pages (SPACE-12004) Low Not applicable CWE-531
Space A REST API endpoint was available without an appropriate permissions check, which could introduce a potential DOS vector (no real exploit available). (SPACE-12288) Low Not applicable CWE-732
TeamCity Reflected XSS on several pages (TW-67424, TW-68098) Medium 2020.2 CVE-2021-25773
TeamCity TeamCity server DoS was possible via server integration (TW-68406, TW-68780) Low 2020.2 CVE-2021-25772
TeamCity ECR token exposure in the build’s parameters (TW-68515) Medium 2020.2 CVE-2021-25776
TeamCity A user could get access to the GitHub access token of another user (TW-68646) Low 2020.2.1 CVE-2021-25774
TeamCity Server admin could create and see access tokens for any other users (TW-68862) Low 2020.2.1 CVE-2021-25775
TeamCity Improper permissions checks during user deletion (TW-68864) Low 2020.2.1 CVE-2021-25778
TeamCity Improper permissions checks during tokens removal (TW-68871) Low 2020.2.1 CVE-2021-25777
TeamCity TeamCity Plugin SSRF. Vulnerability that could potentially expose user credentials. Reported by Jonathan Leitschuh (TW-69068) High 2020.2.85695 CVE-2020-35667

If you need any further assistance, please contact our Security Team.

Subscribe to receive the bulletin in your mailbox.

Your JetBrains Team
The Drive to Develop

]]>
https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/feed/ 0
JetBrains Security Bulletin Q2 2020 https://blog.jetbrains.com/blog/2020/08/06/jetbrains-security-bulletin-q2-2020/ Thu, 06 Aug 2020 08:10:05 +0000 https://blog.jetbrains.com/wp-content/uploads/2020/08/JetBrains-Security-Bulletin_Image_1280h8001597315970333.png https://blog.jetbrains.com/?post_type=blog&p=64234 In the second quarter of 2020, we resolved a number of security issues in our products. Here’s a summary report that contains a description of each issue and the version in which it was resolved.

Product Description Severity Resolved in CVE/CWE
Datalore Stack trace disclosure. (DL-7350) Low Not applicable CWE-536
Datalore Reverse tabnabbing was possible. (DL-7708) Low Not applicable CWE-1022
JetBrains Account Throttling for reset password functionality was missing if 2FA was enabled. Reported by Manu Pranav. (JPF-10527) Medium 2020.06 CWE-799
JetBrains Website Stack trace disclosure in case of an incorrect character in request. (JS-12490) Low Not applicable CWE-536
JetBrains Website Reflected XSS on jetbrains.com subdomain. Reported by Ritik Chaddha. (JS-12562) Low Not applicable CWE-79
JetBrains Website Open-redirect issues on kotlinconf.com. Reported by Ritik Chaddha. (JS-12581) Low Not applicable CWE-601
JetBrains Website Clickjacking was possible on a non-existent page. Reported by Pravas Ranjan Kanungo. (JS-12835) Low Not applicable CWE-1021
YouTrack Subtasks workflow could disclose the existence of an issue. (JT-45316) Low 2020.2.8527 CVE-2020-15818
YouTrack An external user could execute commands against arbitrary issues. (JT-56848) High 2020.1.1331 CVE-2020-15817
YouTrack SSRF vulnerability that allowed scanning internal ports. Reported by Evren Yalçın. (JT-56917) Low 2020.2.10643 CVE-2020-15819
YouTrack It was possible to change a redirect from any existing YouTrack InCloud instance to another instance. (JT-57036) Medium 2020.1.3588 CWE-601
YouTrack The markdown parser could disclose the existence of a hidden file. (JT-57235) Low 2020.2.6881 CVE-2020-15820
YouTrack A user without the appropriate permissions could create an article draft. (JT-57649) Medium 2020.2.6881 CVE-2020-15821
YouTrack The AWS metadata of a YouTrack InCloud instance was disclosed via SSRF in a workflow. Reported by Yurii Sanin. (JT-57964) High 2020.2.8873 CVE-2020-15823
YouTrack SSRF was possible because URL filtering could be escaped. Reported by Yurii Sanin. (JT-58204) Low 2020.2.10514 CVE-2020-15822
Kotlin Script cache privilege escalation vulnerability. Reported by Henrik Tunedal. (KT-38222) Medium 1.4.0 CVE-2020-15824
Space Draft title was disclosed to a user without access to the draft. (SPACE-5594) Low Not applicable CWE-200
Space A missing authorization check caused privilege escalation. Reported by Callum Carney. (SPACE-8034) High Not applicable CWE-266
Space Blind SSRF via calendar import. Reported by Yurii Sanin. (SPACE-8273) Medium Not applicable CWE-918
Space Drafts of direct messages sent from the iOS app could be sent to the channel. (SPACE-8377) Low Not applicable CWE-200
Space Chat messages were propagated to the browser console. (SPACE-8386) High Not applicable CWE-215
Space Missing authentication checks in Space Automation. (SPACE-8431) Critical Not applicable CWE-306
Space Missing authentication checks in Job-related API. (SPACE-8822) Low Not applicable CWE-306
Space Incorrect checks of public key content. (SPACE-9169) Medium Not applicable CWE-287
Space Stored XSS via repository resource. (SPACE-9277) High Not applicable CWE-79
Toolbox App Missing signature on “jetbrains-toolbox.exe”. (TBX-4671) Low 1.17.6856 CVE-2020-15827
TeamCity Users were able to assign more permissions than they had. (TW-36158) Low 2020.1 CVE-2020-15826
TeamCity Users with the “Modify group” permission could elevate other users’ privileges. (TW-58858) Medium 2020.1 CVE-2020-15825
TeamCity Password parameters could be disclosed via build logs. (TW-64484) Low 2019.2.3 CVE-2020-15829
TeamCity Project parameter values could be retrieved by a user without the appropriate permissions. (TW-64587) High 2020.1.1 CVE-2020-15828
TeamCity Reflected XSS on administration UI. (TW-64668) High 2019.2.3 CVE-2020-15831
TeamCity Stored XSS on administration UI. (TW-64699) High 2019.2.3 CVE-2020-15830
Upsource Unauthorized access was possible through an error in accounts linking. (SDP-940) Low 2020.1 CVE-2019-19704

If you need any further assistance, please contact our Security Team.

Subscribe to receive the bulletin in your mailbox.

Your JetBrains Team
The Drive to Develop

]]>
JetBrains Security Bulletin Q1 2020 https://blog.jetbrains.com/blog/2020/04/22/jetbrains-security-bulletin-q1-2020/ https://blog.jetbrains.com/blog/2020/04/22/jetbrains-security-bulletin-q1-2020/#respond Wed, 22 Apr 2020 10:00:01 +0000 https://blog.jetbrains.com/?p=10583 In the first quarter of 2020, we resolved a number of security issues in our products. Here’s a summary report that contains a description of each issue and the version in which it was resolved.

Product Description Severity Resolved in CVE/CWE
Datalore User’s SSH key can be deleted without appropriate permissions. Reported by Callum Carney (DL-7833) Moderate Not applicable CWE-639
Datalore SSRF could be caused by an attached file. Reported by Callum Carney (DL-7836) High Not applicable CWE-918
GoLand Plain HTTP was used to access plugin repository (GO-8694) Low 2019.3.2 CVE-2020-11685
IntelliJ IDEA License server could be resolved to untrusted host in some cases (IDEA-219748) High 2020.1 CVE-2020-11690
JetBrains Account Non-unique QR codes were generated during consequent attempts to set up 2FA (JPF-10149) Low 2020.01 CWE-342
JetBrains Account Clickjacking was possible on a JetBrains Account page. Reported by Raja Ahtisham (JPF-10154) Moderate 2020.01 CWE-1021
JetBrains Account Customer name enumeration by numeric customer ID was possible (JPF-10159, JPF-10301) High 2020.03 CWE-200
JetBrains Account Country value coming from a user wasn’t correctly validated (JPF-10258) High 2020.02 CWE-285
JetBrains Account Information disclosure from JetBrains Account was possible via the “Back” button. Reported by Ratnadip Gajbhiye (JPF-10266) Low 2020.02 CWE-200
JetBrains Website Reflected XSS at jetbrains.com was possible. Reported by Rahad Chowdhury (JS-11769) High Not applicable CWE-79
Hub Content spoofing at Hub OAuth error message was possible (JPS-10093) Moderate 2020.1.12099 CVE-2020-11691
Plugin Marketplace Uploading malicious file via Screenshots form could cause XSS (MP-2637) Moderate Not applicable CWE-79
PyCharm Apple Notarization Service credentials were included in PyCharm distributive for Windows. Reported by Ruby Nealon (IDEA-232217) High 2019.3.3, 2019.2.6 CVE-2020-11694
Space Session timeout period was configured improperly (SPACE-4717) Low Not applicable CVE-2020-11795
Space Stored XSS in Space chats was possible. Reported by Callum Carney (SPACE-6556) Moderate Not applicable CVE-2020-11416
Space Password authentication implementation was insecure (SPACE-7282) High Not applicable CVE-2020-11796
TeamCity Password values were shown not being masked on several pages (TW-64186) Low 2019.2.2 CVE-2020-11687
TeamCity Project administrator was able to see scrambled password parameters used in a project (TW-58099) Moderate 2019.2.2 CVE-2020-11938
TeamCity Project administrator was able to retrieve some TeamCity server settings (TW-61626) Low 2019.1.4 CVE-2020-11686
TeamCity Application state kept alive after a user ended their session (TW-61824) Low 2019.2.1 CVE-2020-11688
TeamCity A user without appropriate permissions was able import settings from settings.kts (TW-63698) Low 2019.2.1 CVE-2020-11689
YouTrack DB export was accessible to read-only administrators (JT-56001) Low 2020.1.659 CVE-2020-11692
YouTrack DoS could be performed by attaching a malformed TIFF to an issue. Reported by Chris Smith (JT-56407) High 2020.1.659 CVE-2020-11693

If you need any further assistance, please contact our Security Team.

Subscribe to receive the bulletin in your mailbox.

Your JetBrains Team
The Drive to Develop

]]>
https://blog.jetbrains.com/blog/2020/04/22/jetbrains-security-bulletin-q1-2020/feed/ 0
JetBrains Security Bulletin Q4 2019 https://blog.jetbrains.com/blog/2020/01/24/jetbrains-security-bulletin-q4-2019/ https://blog.jetbrains.com/blog/2020/01/24/jetbrains-security-bulletin-q4-2019/#comments Fri, 24 Jan 2020 12:19:06 +0000 https://blog.jetbrains.com/?p=10196 In the fourth quarter of 2019, we resolved a series of security issues in our products. Here’s a summary report that contains a description of each issue and the version in which it was resolved.

Product Description Severity Resolved in CVE/CWE
IDETalk plugin XXE in IDETalk plugin. (IDEA-220136 reported by Srikanth Ramu) Moderate 193.4099.10 CVE-2019-18412
IntelliJ IDEA Some Maven repositories are accessed via HTTP instead of HTTPs. (IDEA-216282) High 2019.3 CVE-2020-7904
IntelliJ IDEA Ports listened to by IntelliJ IDEA are exposed to the network. (IDEA-219695) Low 2019.3 CVE-2020-7905
IntelliJ IDEA XSLT debugger plugin misconfiguration allows arbitrary file read over network. (IDEA-216621 reported by Anatoly Korniltsev) Moderate 2019.3 CVE-2020-7914
JetBrains Account Profile names are exposed by email. (JPF-9219 reported by Timon Birk) Low 2019.11 CWE-200
JetBrains Account Missing secure flag for cookie. (JPF-9857) Low 2019.11 CWE-614
JetBrains Account Insufficient authentication on contact view. (JPF-10024) High 2019.11 CWE-287
JetBrains Account Insufficient authentication on role update. (JPF-10025) High 2019.11 CWE-287
JetBrains Account XSS on the spending report page. (JPF-10027) Moderate 2019.12 CWE-79
JetBrains Account Open redirect during re-acceptance of license agreements. (JPF-10028) Low 2019.11 CWE-601
JetBrains Account Information exposure during processing of license requests. (JPF-10111) High 2019.12 CWE-200
JetBrains Website Cookie XSS at jetbrains.com. (JS-10969) High Not applicable CWE-79
Kotlin Ktor The Ktor framework is vulnerable to HTTP Response Splitting. Reported by Jonathan Leitschuh High 1.2.6 CVE-2019-19389
Kotlin Ktor The Ktor client resends authorization data to a redirect location. Reported by Jonathan Leitschu Low 1.2.6 CVE-2019-19703
Kotlin Ktor Request smuggling is possible when both chunked Transfer-Encoding and Content-Length are specified. Reported by Jonathan Leitschuh Low 1.3.0 CVE-2020-5207
Plugin Marketplace XSS on several pages. (MP-2617, MP-2640, MP-2642) Low Not applicable CWE-79
Plugin Marketplace Improper access control during plugins upload. (MP-2695) Critical Not applicable CWE-284
Rider Unsigned binaries in Windows installer. (RIDER-30393) Moderate 2019.3 CVE-2020-7906
Scala plugin Artifact dependencies were resolved over unencrypted connections. (SCL-15063) High 2019.2.1 CVE-2020-7907
TeamCity Reverse Tabnabbing is possible on several pages. (TW-61710, TW-61726, TW-61727) Low 2019.1.5 CVE-2020-7908
TeamCity Some server-stored passwords can be shown via web UI. (TW-62674) High 2019.1.5 CVE-2020-7909
TeamCity Possible stored XSS attack by a user with a developer role. (TW-63298) Moderate 2019.2 CVE-2020-7910
TeamCity Stored XSS on user-level pages. (TW-63160) High 2019.2 CVE-2020-7911
YouTrack CORS misconfiguration on youtrack.jetbrains.com. (JT-53675) Moderate Not applicable CWE-346
YouTrack SMTP/Jabber settings can be accessed using backups. (JT-54139) Moderate 2019.2.59309 CVE-2020-7912
YouTrack XSS via image upload at youtrack-workflow-converter.jetbrains.com. (JT-54589) Low Not applicable CWE-80
YouTrack XSS via issue description. (JT-54719) High 2019.2.59309 CVE-2020-7913

If you need any further assistance, please contact our Security Team.

Subscribe to receive the bulletin in your mailbox.

Your JetBrains Team
The Drive to Develop

]]>
https://blog.jetbrains.com/blog/2020/01/24/jetbrains-security-bulletin-q4-2019/feed/ 8