Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6F6ABD2-387F-49D7-8C20-2E2D4D4F1313", "versionEndExcluding": "2018.1.8", "versionStartIncluding": "2018.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A62C32-1751-42AC-85B9-43BE8E358930", "versionEndExcluding": "2018.2.8", "versionStartIncluding": "2018.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC3CAF23-023D-4BF4-B0E0-DD47269439E1", "versionEndExcluding": "2018.3.4", "versionStartIncluding": "2018.3", "vulnerable": true}, {"criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "4983D7DB-FE92-4956-BB45-24838377C8E9", "versionEndExcluding": "2018.3.7", "versionStartIncluding": "2018.3.5", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "In several JetBrains IntelliJ IDEA Ultimate versions, an Application Server run configuration (for Tomcat, Jetty, Resin, or CloudBees) with the default setting allowed a remote attacker to execute code when the configuration is running, because a JMX server listened on all interfaces instead of localhost only. The issue has been fixed in the following versions: 2018.3.4, 2018.2.8, 2018.1.8, and 2017.3.7."}, {"lang": "es", "value": "En varias versiones de IntelliJ IDEA Ultimate de JetBrains, una configuraci\u00f3n de ejecuci\u00f3n del Servidor de aplicaciones (para Tomcat, Jetty, Resin o CloudBees) con la configuraci\u00f3n predeterminada permiti\u00f3 que un atacante remoto ejecutara c\u00f3digo cuando la configuraci\u00f3n se est\u00e1 ejecutando, porque un servidor JMX escuch\u00f3 en todas las interfaces. de localhost solamente. El problema se ha solucionado en las siguientes versiones: 2018.3.4, 2018.2.8, 2018.1.8 y 2017.3.7."}], "id": "CVE-2019-10104", "lastModified": "2024-11-21T04:18:24.910", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-07-03T19:15:12.190", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}