First published: Sun Apr 21 2019(Updated: )
arrow-kt Arrow before 0.9.0 resolved Gradle build artifacts (for compiling and building the published JARs) over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by an MITM attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Arrow | <0.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11404 has a medium severity rating due to the potential for MITM attacks exploiting unencrypted HTTP connections.
To fix CVE-2019-11404, update to Arrow version 0.9.0 or later to ensure that Gradle build artifacts are resolved over HTTPS.
Any users of Arrow versions prior to 0.9.0 are affected by CVE-2019-11404 due to the reliance on HTTP for artifact resolution.
CVE-2019-11404 can be exploited through Man-in-the-Middle (MITM) attacks, allowing attackers to compromise build artifacts.
The consequence of CVE-2019-11404 is that maliciously altered dependencies could be included in a build, potentially compromising applications.