First published: Wed Jul 03 2019(Updated: )
In several versions of JetBrains IntelliJ IDEA Ultimate, creating run configurations for cloud application servers leads to saving a cleartext unencrypted record of the server credentials in the IDE configuration files. If the Settings Repository plugin was then used and configured to synchronize IDE settings using a public repository, these credentials were published to this repository. The issue has been fixed in the following versions: 2019.1, 2018.3.5, 2018.2.8, and 2018.1.8.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
JetBrains IntelliJ IDEA | >=2018.1<2018.1.8 | |
JetBrains IntelliJ IDEA | >=2018.2<2018.2.8 | |
JetBrains IntelliJ IDEA | >=2018.3<2018.3.5 | |
JetBrains IntelliJ IDEA | >=2018.3.6<2019.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9872 is a vulnerability in several versions of JetBrains IntelliJ IDEA Ultimate that leads to saving cleartext unencrypted server credentials in IDE configuration files.
CVE-2019-9872 has a severity rating of 8.1 (high).
JetBrains IntelliJ IDEA Ultimate versions between 2018.1 and 2019.1 are affected by CVE-2019-9872.
To fix CVE-2019-9872, update your JetBrains IntelliJ IDEA Ultimate to a version above 2019.1.
You can find more information about CVE-2019-9872 in the JetBrains Security Bulletin for Q1 2019.