ghsa-c445-694v-cp45
Vulnerability from github
Published
2024-06-18 09:31
Modified
2025-09-08 12:30
Severity ?
Details
When Bazel Plugin in intellij imports a project (either using "import project" or "Auto import") the dialog for trusting the project is not displayed. This comes from the fact that both call the method ProjectBuilder.createProject which then calls ProjectManager.getInstance().createProject. This method, as its name suggests is intended to create a new project, not to import an existing one. We recommend upgrading to version 2024.06.04.0.2 or beyond for the IntelliJ, CLion and Android Studio Bazel plugins.
{ "affected": [], "aliases": [ "CVE-2024-5899" ], "database_specific": { "cwe_ids": [ "CWE-20", "CWE-862" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-06-18T09:15:09Z", "severity": "LOW" }, "details": "When Bazel Plugin in intellij imports a project (either using \"import project\" or \"Auto import\") the dialog for trusting the project is not displayed.\u00a0This comes from the fact that both call the method ProjectBuilder.createProject\u00a0which then calls ProjectManager.getInstance().createProject. This method, as its name suggests is intended to create a new project, not to import an existing one.\u00a0\nWe recommend upgrading to version 2024.06.04.0.2 or beyond for the IntelliJ, CLion and Android Studio Bazel plugins.", "id": "GHSA-c445-694v-cp45", "modified": "2025-09-08T12:30:32Z", "published": "2024-06-18T09:31:10Z", "references": [ { "type": "WEB", "url": "https://github.com/bazelbuild/intellij/security/advisories/GHSA-hh9f-wmhw-46vg" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5899" }, { "type": "WEB", "url": "https://github.com/bazelbuild/intellij/releases/tag/v2024.06.04-aswb-stable" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "type": "CVSS_V4" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.