Skip to main content

Exploitation of the vulnerability could lead to the disclosure of access tokens to third-party sites

Summary

Exploitation of the vulnerability could lead to the disclosure of access tokens to third-party sites

Affected platforms

The following platforms are known to be affected:

Threat details

Introduction

JetBrains has released a critical security advisory addressing one critical vulnerability, which if exploited, could lead to the disclosure of access tokens to 3rd party sites. Insufficiently protected credential CVE-2024-37051 vulnerability has a CVSSv3 score of 9.3 and affects all IntelliJ-based integrated development environments (IDEs) as of version 2023.1 that have the JetBrains GitHub plugin enabled and configured/in-use. 

JetBrains IntellJ is an open source software (OSS) platform for building IDEs and language-aware developer tools.

Remediation advice

Affected organisations are encouraged to review the latest JetBrains blog. In addition, apply the latest version available for any used IDEs. 

If the GitHub pull request functionality in the IDE is used, revoke any GitHub tokens being used by the plugin. Given that the plugin can use OAuth integration or Personal Access Token (PAT), check both and revoke as necessary:

Please note that after the token has been revoked, it will be necessary to set up the plugin again as all plugin features (including Git operations) will stop working. 

The below IDEs are fixed versions;

Definitive source of threat updates

CVE Vulnerabilities

Last edited: 11 June 2024 3:25 pm