CVE-2024-52555
https://notcve.org/view.php?id=CVE-2024-52555
In JetBrains WebStorm before 2024.3 code execution in Untrusted Project mode was possible via type definitions installer script • https://www.jetbrains.com/privacy-security/issues-fixed • CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data •
CVE-2024-37051
https://notcve.org/view.php?id=CVE-2024-37051
GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4 El token de acceso de GitHub podría estar expuesto a sitios de terceros en los IDE de JetBrains posteriores a la versión 2023.1 y anteriores a: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4 • https://github.com/LeadroyaL/CVE-2024-37051-EXP https://github.com/mrblackstar26/CVE-2024-37051 https://www.jetbrains.com/privacy-security/issues-fixed https://security.netapp.com/advisory/ntap-20240705-0004 • CWE-522: Insufficiently Protected Credentials •
CVE-2021-45977
https://notcve.org/view.php?id=CVE-2021-45977
JetBrains IntelliJ IDEA 2021.3.1 Preview, IntelliJ IDEA 2021.3.1 RC, PyCharm Professional 2021.3.1 RC, GoLand 2021.3.1, PhpStorm 2021.3.1 Preview, PhpStorm 2021.3.1 RC, RubyMine 2021.3.1 Preview, RubyMine 2021.3.1 RC, CLion 2021.3.1, WebStorm 2021.3.1 Preview, and WebStorm 2021.3.1 RC (used as Remote Development backend IDEs) bind to the 0.0.0.0 IP address. The fixed versions are: IntelliJ IDEA 2021.3.1, PyCharm Professional 2021.3.1, GoLand 2021.3.2, PhpStorm 2021.3.1 (213.6461.83), RubyMine 2021.3.1, CLion 2021.3.2, and WebStorm 2021.3.1. JetBrains IntelliJ IDEA versión 2021.3.1 Preview, IntelliJ IDEA versión 2021.3.1 RC, PyCharm Professional versión 2021.3.1 RC, GoLand versión 2021.3.1, PhpStorm versión 2021.3.1 Preview, PhpStorm versión 2021.3.1 RC, RubyMine versión 2021. 3.1 Preview, RubyMine versión 2021.3.1 RC, CLion versión 2021.3.1, WebStorm versión 2021.3.1 Preview, y WebStorm versión 2021.3.1 RC (usados como IDEs de desarrollo remoto) son enlazados a la dirección IP 0.0.0.0. Las versiones fijas son: IntelliJ IDEA versión 2021.3.1, PyCharm Professional versión 2021.3.1, GoLand versión 2021.3.2, PhpStorm versión 2021.3.1 (213.6461.83), RubyMine versión 2021.3.1, CLion versión 2021.3.2, y WebStorm versión 2021.3.1. • https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021 https://jetbrains.com •
CVE-2021-31897
https://notcve.org/view.php?id=CVE-2021-31897
In JetBrains WebStorm before 2021.1, code execution without user confirmation was possible for untrusted projects. En JetBrains WebStorm versiones anteriores a 2021.1, una ejecución de código sin la confirmación del usuario fue posible para proyectos que no eran confiable • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021 •
CVE-2021-31898
https://notcve.org/view.php?id=CVE-2021-31898
In JetBrains WebStorm before 2021.1, HTTP requests were used instead of HTTPS. En JetBrains WebStorm versiones anteriores a 2021.1, fueron usados peticiones HTTP en lugar de HTTPS • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021 • CWE-319: Cleartext Transmission of Sensitive Information •