Using ktlint to download and execute custom rulesets can result in arbitrary code execution as the served jars can be compromised by a MITM. This attack is exploitable via Man in the Middle of the HTTP connection to the artifact servers. This vulnerability appears to have been fixed in 0.30.0 and later; after commit 5e547b287d6c260d328a2cb658dbe6b7a7ff2261.
Published 2019-04-02 15:29:00
Updated 2020-08-24 17:37:01
Source DWF
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2019-1010260

Probability of exploitation activity in the next 30 days: 0.18%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 54 % EPSS Score History EPSS FAQ

CVSS scores for CVE-2019-1010260

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
9.3
HIGH AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
NIST
8.1
HIGH CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
2.2
5.9
NIST

CWE ids for CVE-2019-1010260

References for CVE-2019-1010260

  • https://github.com/shyiko/ktlint/pull/332
    [CVE-2019-1010260] [SECURITY] Resolve dependenices over HTTPS instead of HTTP by JLLeitschuh · Pull Request #332 · pinterest/ktlint · GitHub
    Exploit;Patch;Third Party Advisory

Products affected by CVE-2019-1010260

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!