Lucene search

K
jetbrainsJebrainsJETBRAINS:JETBRAINS-SECURITY-BULLETIN-Q1-2021
HistoryMay 07, 2021 - 12:00 a.m.

JetBrains Security Bulletin Q1 2021

2021-05-0700:00:00
Jebrains
blog.jetbrains.com
41

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.8%

JetBrains News Security

JetBrains Security Bulletin Q1 2021

Robert Demmer

Robert Demmer

In the first quarter of 2021, we resolved a number of security issues in our products. Here’s a summary report that contains a description of each issue and the version in which it was resolved.

Product Description Severity Resolved in CVE/CWE
Code With Me A client could execute code in read-only mode (CWM-1235) Medium Compatible IDEs 2021.1 version CVE-2021-31899
Code With Me A client could open a browser on the host (CWM-1769) Low Compatible IDEs 2021.1 version CVE-2021-31900
Exception Analyzer No throttling on the Exception Analyzer login page. Reported by Ashhad Ali (EXA-760) Low Not applicable Not applicable
IntelliJ IDEA XXE in License server functionality. Reported by Reef Spektor (IDEA-260143) High 2020.3.3 CVE-2021-30006
IntelliJ IDEA Code execution without user confirmation was possible for untrusted projects (IDEA-260911, IDEA-260912, IDEA-260913, IDEA-261846, IDEA-261851, IDEA-262917, IDEA-263981, IDEA-264782) Medium 2020.3.3 CVE-2021-29263
IntelliJ IDEA Possible DoS. Reported by Arun Malik (IDEA-261832) Medium 2021.1 CVE-2021-30504
JetBrains Academy Potential takeover of a future account with a known email address. Reported by Vansh Devgan (JBA-110) Low Not applicable Not applicable
JetBrains Account Sensitive account URLs were shared with third parties. Reported by Vikram Naidu (JPF-11338) High 2021.02 Not applicable
JetBrains Websites Reflected XSS at blog.jetbrains.com. Reported by Peter Af Geijerstam and Jai Kumar (JS-14554, JS-14562) Low Not applicable Not applicable
Hub Two-factor authentication wasn’t enabled properly for the “All Users” group (JPS-10694) Low 2021.1.13079 CVE-2021-31901
YouTrack Stored XSS via attached file. Reported by Mikhail Klyuchnikov (JT-62530) Medium 2020.6.6441 CVE-2021-27733
YouTrack Pull request title was insufficiently sanitized (JT-62556) Medium 2021.1.9819 CVE-2021-31903
YouTrack Improper access control while exporting issues (JT-62649) High 2020.6.6600 CVE-2021-31902
YouTrack Information disclosure in issue preview. Reported by Philip Wedemann (JT-62919) High 2020.6.8801 CVE-2021-31905
PyCharm Code execution without user confirmation was possible for untrusted projects. Reported by Tony Torralba (PY-41524) Medium 2020.3.4 CVE-2021-30005
Space Insufficient CRLF sanitization in user input (SPACE-13955) Low Not applicable Not applicable
TeamCity Cloud Potential information disclosure via EC2 instance metadata (TCC-174, TCC-176) Low Not applicable Not applicable
TeamCity Cloud Temporary credentials disclosure via command injection. Reported by Chris Moore (TCC-196) Major Not applicable Not applicable
TeamCity Potential XSS on the test history page (TW-67710) Medium 2020.2.2 CVE-2021-31904
TeamCity TeamCity IntelliJ Plugin DOS. Reported by Jonathan Leitschuh (TW-69070) Low 2020.2.2 CVE-2021-26310
TeamCity Local information disclosure via a temporary file in the TeamCity IntelliJ Plugin. Reported by Jonathan Leitschuh (TW-69420) Low 2020.2.2 CVE-2021-26309
YouTrack Insufficient audit when an administrator uploads a file (TW-69511) Low 2020.2.2 CVE-2021-31906
TeamCity Improper permission checks for changing TeamCity plugins (TW-69521) Low 2020.2.2 CVE-2021-31907
TeamCity Potential XSS on the test page. Reported by Stephen Patches (TW-69737) Low 2020.2.2 CVE-2021-3315
TeamCity Argument injection leading to RCE (TW-70054) High 2020.2.3 CVE-2021-31909
TeamCity Stored XSS on several pages (TW-70078, TW-70348) Medium 2020.2.3 CVE-2021-31908
TeamCity Information disclosure via SSRF (TW-70079) High 2020.2.3 CVE-2021-31910
TeamCity Reflected XSS on several pages (TW-70093, TW-70094, TW-70095, TW-70096, TW-70137) Medium 2020.2.3 CVE-2021-31911
TeamCity Potential account takeover during password reset (TW-70303) Medium 2020.2.3 CVE-2021-31912
TeamCity Insufficient checks of the redirect_uri during GitHub SSO token exchange (TW-70358) Low 2020.2.3 CVE-2021-31913
TeamCity Arbitrary code execution on TeamCity Server running on Windows. Reported by Chris Moore (TW-70512) High 2020.2.4 CVE-2021-31914
TeamCity Command injection leading to RCE. Reported by Chris Moore (TW-70541) High 2020.2.4 CVE-2021-31915
Upsource Application passwords were not revoked correctly. Reported by Thibaut Zonca (UP-10843) High 2020.1.1883 CVE-2021-30482
WebStorm HTTP requests were used instead of HTTPS (WEB-49549) Low 2021.1 CVE-2021-31898
WebStorm Code execution without user confirmation was possible for untrusted projects (WEB-49689, WEB-49902) Low 2021.1 CVE-2021-31897

If you need any further assistance, please contact our Security Team.

Subscribe to receive the bulletin in your mailbox.

Your JetBrains Team_
The Drive to Develop_

bulletin security security bulletin

SpringShell Vulnerability in JetBrains Products and Services Next post

Subscribe to JetBrains Blog updates

Subscribe form

By submitting this form, I agree to the JetBrains Privacy Policy Notification icon

By submitting this form, I agree that JetBrains s.r.o. (“JetBrains”) may use my name, email address, and location data to send me newsletters, including commercial communications, and to process my personal data for this purpose. I agree that JetBrains may process said data using third-party services for this purpose in accordance with the JetBrains Privacy Policy. I understand that I can revoke this consent at any time in my profile. In addition, an unsubscribe link is included in each email.

Submit

Thanks, we’ve got you!

image description

Affected configurations

Vulners
Node
jetbrainscode_with_meRange<2021.1
OR
jetbrainscode_with_meRange<2021.1
OR
jetbrainsintellij_ideaRange<2020.3.3
OR
jetbrainsintellij_ideaRange<2020.3.3
OR
jetbrainsintellij_ideaRange<2021.1
OR
jetbrainsscalaRange<2021.02jetbrains
OR
jetbrainshubRange<2021.1.13079
OR
jetbrainsyoutrackRange<2020.6.6441
OR
jetbrainsyoutrackRange<2021.1.9819
OR
jetbrainsyoutrackRange<2020.6.6600
OR
jetbrainsyoutrackRange<2020.6.8801
OR
jetbrainspycharmRange<2020.3.4
OR
jetbrainsteamcityRange<2020.2.2
OR
jetbrainsteamcityRange<2020.2.2
OR
jetbrainsteamcityRange<2020.2.2
OR
jetbrainsyoutrackRange<2020.2.2
OR
jetbrainsteamcityRange<2020.2.2
OR
jetbrainsteamcityRange<2020.2.2
OR
jetbrainsteamcityRange<2020.2.3
OR
jetbrainsteamcityRange<2020.2.3
OR
jetbrainsteamcityRange<2020.2.3
OR
jetbrainsteamcityRange<2020.2.3
OR
jetbrainsteamcityRange<2020.2.3
OR
jetbrainsteamcityRange<2020.2.3
OR
jetbrainsteamcityRange<2020.2.4
OR
jetbrainsteamcityRange<2020.2.4
OR
jetbrainsupsourceRange<2020.1.1883
OR
jetbrainswebstormRange<2021.1
OR
jetbrainswebstormRange<2021.1

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.8%

Related for JETBRAINS:JETBRAINS-SECURITY-BULLETIN-Q1-2021