CVE-2019-14959 - Missing Encryption of Sensitive Data

Severity

59%

Complexity

22%

Confidentiality

60%

JetBrains Toolbox before 1.15.5605 was resolving an internal URL via a cleartext http connection.

JetBrains Toolbox before 1.15.5605 was resolving an internal URL via a cleartext http connection.

CVSS 3.1 Base Score 5.9. CVSS Attack Vector: network. CVSS Attack Complexity: high. CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).

CVSS 2.0 Base Score 4.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).

Demo Examples

Missing Encryption of Sensitive Data

CWE-311

This code writes a user's login information to a cookie so the user does not have to login again later.


               
}
setcookie ("userdata", $data);

The code stores the user's username and password in plaintext in a cookie on the user's machine. This exposes the user's login information if their computer is compromised by an attacker. Even if the user's machine is not compromised, this weakness combined with cross-site scripting (CWE-79) could allow an attacker to remotely copy the cookie.

Also note this example code also exhibits Plaintext Storage in a Cookie (CWE-315).

Missing Encryption of Sensitive Data

CWE-311

The following code attempts to establish a connection, read in a password, then store it to a buffer.


               
...

While successful, the program does not encrypt the data before writing it to a buffer, possibly exposing it to unauthorized actors.

Missing Encryption of Sensitive Data

CWE-311

The following code attempts to establish a connection to a site to communicate sensitive information.


               
}
hu.disconnect();
//...

Though a connection is successfully made, the connection is unencrypted and it is possible that all sensitive data sent to or received from the server will be read by unintended actors.

Overview

First reported 5 years ago

2019-10-02 19:15:00

Last updated 5 years ago

2019-10-04 20:00:00

Affected Software

Jetbrains Toolbox

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.