Vulnerability Description
In several JetBrains IntelliJ IDEA versions, a Spring Boot run configuration with the default setting allowed remote attackers to execute code when the configuration is running, because a JMX server listens on all interfaces (instead of listening on only the localhost interface). This issue has been fixed in the following versions: 2019.1, 2018.3.4, 2018.2.8, 2018.1.8, and 2017.3.7.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jetbrains | Intellij Idea | >= 2018.1, < 2018.1.8 |
Related Weaknesses (CWE)
References
- https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/Vendor Advisory
- https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/Vendor Advisory
FAQ
What is CVE-2019-9186?
CVE-2019-9186 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In several JetBrains IntelliJ IDEA versions, a Spring Boot run configuration with the default setting allowed remote attackers to execute code when the configuration is running, because a JMX server l...
How severe is CVE-2019-9186?
CVE-2019-9186 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-9186?
Check the references section above for vendor advisories and patch information. Affected products include: Jetbrains Intellij Idea.