Vulnerability Description
Using ktlint to download and execute custom rulesets can result in arbitrary code execution as the served jars can be compromised by a MITM. This attack is exploitable via Man in the Middle of the HTTP connection to the artifact servers. This vulnerability appears to have been fixed in 0.30.0 and later; after commit 5e547b287d6c260d328a2cb658dbe6b7a7ff2261.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ktlint Project | Ktlint | < 0.30.0 |
Related Weaknesses (CWE)
References
- https://github.com/shyiko/ktlint/pull/332ExploitPatchThird Party Advisory
- https://github.com/shyiko/ktlint/pull/332ExploitPatchThird Party Advisory
FAQ
What is CVE-2019-1010260?
CVE-2019-1010260 is a vulnerability with a CVSS score of 8.1 (HIGH). Using ktlint to download and execute custom rulesets can result in arbitrary code execution as the served jars can be compromised by a MITM. This attack is exploitable via Man in the Middle of the HTT...
How severe is CVE-2019-1010260?
CVE-2019-1010260 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-1010260?
Check the references section above for vendor advisories and patch information. Affected products include: Ktlint Project Ktlint.