Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6F6ABD2-387F-49D7-8C20-2E2D4D4F1313", "versionEndExcluding": "2018.1.8", "versionStartIncluding": "2018.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A62C32-1751-42AC-85B9-43BE8E358930", "versionEndExcluding": "2018.2.8", "versionStartIncluding": "2018.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CD2EE41-43C6-4328-A767-7271D1BE7D1F", "versionEndExcluding": "2018.3.5", "versionStartIncluding": "2018.3", "vulnerable": true}, {"criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA42965B-0D50-45AC-B28E-39016D2023CC", "versionEndExcluding": "2019.1", "versionStartIncluding": "2018.3.6", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "In several versions of JetBrains IntelliJ IDEA Ultimate, creating run configurations for cloud application servers leads to saving a cleartext unencrypted record of the server credentials in the IDE configuration files. If the Settings Repository plugin was then used and configured to synchronize IDE settings using a public repository, these credentials were published to this repository. The issue has been fixed in the following versions: 2019.1, 2018.3.5, 2018.2.8, and 2018.1.8."}, {"lang": "es", "value": "En varias versiones de IntelliJ IDEA Ultimate de JetBrains, la creaci\u00f3n de configuraciones de ejecuci\u00f3n para servidores de aplicaciones en la nube permite guardar un registro sin cifrar de texto claro de las credenciales del servidor en los archivos de configuraci\u00f3n de IDE. Si el complemento de Repositorio de configuraci\u00f3n se us\u00f3 y configur\u00f3 para sincronizar la configuraci\u00f3n de IDE utilizando un repositorio p\u00fablico, estas credenciales se publicaron en este repositorio. El problema se ha solucionado en las siguientes versiones: 2019.1, 2018.3.5, 2018.2.8 y 2018.1.8."}], "id": "CVE-2019-9872", "lastModified": "2024-11-21T04:52:28.907", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-07-03T19:15:13.690", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-312"}, {"lang": "en", "value": "CWE-522"}], "source": "nvd@nist.gov", "type": "Primary"}]}