Exposure of GitHub Access Tokens in JetBrains IDEs by JetBrains
CVE-2024-37051
Summary
The vulnerability in JetBrains IDEs can potentially expose GitHub access tokens to unauthorized third-party sites. This issue affects multiple IDE versions, including IntelliJ IDEA, CLion, DataGrip, GoLand, PhpStorm, PyCharm, Rider, RubyMine, RustRover, and WebStorm. Developers utilizing these tools are at risk of token exposure, which could enable malicious entities to gain unauthorized access to repositories. Users are advised to promptly update their IDEs to secure versions to mitigate this risk. Regular monitoring of security advisories and implementing best practices in credential management can help protect sensitive information from exposure.
Affected Version(s)
Aqua 0 < 2024.1.2
CLion 2023.1 < 2023.1.7
CLion 2023.1 < 2023.2.4
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles

CVE-2024-37051: кибербандиты похищают GitHub-токены через IntelliJ IDEA
Как популярная среда разработки стала точкой входа для дальнейшей компрометации?
Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051) - Help Net Security
CVE-2024-37051 could expose users of JetBrains' integrated development environments (IDEs) to GitHub access token compromise.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
- 📰
First article discovered by Help Net Security
Vulnerability published