Description
Using ktlint to download and execute custom rulesets can result in arbitrary code execution as the served jars can be compromised by a MITM. This attack is exploitable via Man in the Middle of the HTTP connection to the artifact servers. This vulnerability appears to have been fixed in 0.30.0 and later; after commit 5e547b287d6c260d328a2cb658dbe6b7a7ff2261.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0433 | Using ktlint to download and execute custom rulesets can result in arbitrary code execution as the served jars can be compromised by a MITM. This attack is exploitable via Man in the Middle of the HTTP connection to the artifact servers. This vulnerability appears to have been fixed in 0.30.0 and later; after commit 5e547b287d6c260d328a2cb658dbe6b7a7ff2261. |
Github GHSA |
GHSA-r8h9-hq9c-2p5c | High severity vulnerability that affects com.github.shyiko.ktlint:ktlint-core |
References
| Link | Providers |
|---|---|
| https://github.com/shyiko/ktlint/pull/332 |
|
History
No history.
Status: PUBLISHED
Assigner: dwf
Published:
Updated: 2024-08-05T03:07:18.513Z
Reserved: 2019-03-20T00:00:00.000Z
Link: CVE-2019-1010260
No data.
Status : Modified
Published: 2019-04-02T15:29:00.480
Modified: 2024-11-21T04:18:06.457
Link: CVE-2019-1010260
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA