cve-2024-5899
Vulnerability from cvelistv5
Published
2024-06-18 08:12
Modified
2025-09-08 09:35
Severity ?
EPSS score ?
Summary
Improper trust check in Bazel Build intellij plugin
References
Impacted products
▼ | Vendor | Product |
---|---|---|
BazelBuild | intellij plugin |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5899", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-18T13:05:41.573147Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-18T13:06:25.291Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:25:03.168Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/bazelbuild/intellij/security/advisories/GHSA-hh9f-wmhw-46vg" }, { "tags": [ "x_transferred" ], "url": "https://github.com/bazelbuild/intellij/releases/tag/v2024.06.04-aswb-stable" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://github.com/bazelbuild/intellij", "defaultStatus": "unaffected", "product": "intellij plugin", "repo": "https://github.com/bazelbuild/intellij", "vendor": "BazelBuild", "versions": [ { "lessThan": "2024.06.04.0.2", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "When Bazel Plugin in intellij imports a project (either using \"import project\" or \"Auto import\") the dialog for trusting the project is not displayed.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis comes from the fact that both call the method \u003c/span\u003e\u003ccode\u003eProjectBuilder.createProject\u003c/code\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;which then calls \u003c/span\u003e\u003ccode\u003eProjectManager.getInstance().createProject\u003c/code\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. This method, as its name suggests is intended to create a new project, not to import an existing one.\u0026nbsp;\u003cbr\u003e\u003c/span\u003eWe recommend upgrading to version 2024.06.04.0.2 or beyond for the IntelliJ, CLion and Android Studio Bazel plugins." } ], "value": "When Bazel Plugin in intellij imports a project (either using \"import project\" or \"Auto import\") the dialog for trusting the project is not displayed.\u00a0This comes from the fact that both call the method ProjectBuilder.createProject\u00a0which then calls ProjectManager.getInstance().createProject. This method, as its name suggests is intended to create a new project, not to import an existing one.\u00a0\nWe recommend upgrading to version 2024.06.04.0.2 or beyond for the IntelliJ, CLion and Android Studio Bazel plugins." } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "baseScore": 1, "baseSeverity": "LOW", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-08T09:35:41.979Z", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "url": "https://github.com/bazelbuild/intellij/security/advisories/GHSA-hh9f-wmhw-46vg" }, { "url": "https://github.com/bazelbuild/intellij/releases/tag/v2024.06.04-aswb-stable" } ], "source": { "discovery": "UNKNOWN" }, "title": "Improper trust check in Bazel Build intellij plugin", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2024-5899", "datePublished": "2024-06-18T08:12:52.772Z", "dateReserved": "2024-06-12T09:28:00.111Z", "dateUpdated": "2025-09-08T09:35:41.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-5899\",\"sourceIdentifier\":\"cve-coordination@google.com\",\"published\":\"2024-06-18T09:15:09.767\",\"lastModified\":\"2025-09-08T10:15:35.087\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When Bazel Plugin in intellij imports a project (either using \\\"import project\\\" or \\\"Auto import\\\") the dialog for trusting the project is not displayed.\u00a0This comes from the fact that both call the method ProjectBuilder.createProject\u00a0which then calls ProjectManager.getInstance().createProject. This method, as its name suggests is intended to create a new project, not to import an existing one.\u00a0\\nWe recommend upgrading to version 2024.06.04.0.2 or beyond for the IntelliJ, CLion and Android Studio Bazel plugins.\"},{\"lang\":\"es\",\"value\":\"Cuando Bazel Plugin en intellij importa un proyecto (ya sea usando \\\"importar proyecto\\\" o \\\"Importar autom\u00e1ticamente\\\"), no se muestra el cuadro de di\u00e1logo para confiar en el proyecto. Esto se debe al hecho de que ambos llaman al m\u00e9todo ProjectBuilder.createProject, que luego llama a ProjectManager.getInstance().createProject. Este m\u00e9todo, como su nombre indica, est\u00e1 destinado a crear un nuevo proyecto, no a importar uno existente. Recomendamos actualizar a la versi\u00f3n 2024.06.04.0.2 o posterior para los complementos IntelliJ, CLion y Android Studio Bazel.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":1.0,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"ACTIVE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"LOW\",\"subIntegrityImpact\":\"LOW\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\",\"baseScore\":3.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:bazel_for_android_studio:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2024.06.04.0.2\",\"matchCriteriaId\":\"DE67B43C-78F7-4868-926D-D920C4AB0834\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:bazel_for_clion:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2024.06.04.0.2\",\"matchCriteriaId\":\"1B7AB8DA-017F-463F-AF23-49CDBD4CC756\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:bazel_for_intellij:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2024.06.04.0.2\",\"matchCriteriaId\":\"AE5DB19D-DAC5-48AE-A248-77C42B350DF4\"}]}]}],\"references\":[{\"url\":\"https://github.com/bazelbuild/intellij/releases/tag/v2024.06.04-aswb-stable\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/bazelbuild/intellij/security/advisories/GHSA-hh9f-wmhw-46vg\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/bazelbuild/intellij/releases/tag/v2024.06.04-aswb-stable\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/bazelbuild/intellij/security/advisories/GHSA-hh9f-wmhw-46vg\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.