Skip to content

High severity vulnerability that affects com.github.shyiko.ktlint:ktlint-core

High severity GitHub Reviewed Published Apr 8, 2019 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

maven com.github.shyiko.ktlint:ktlint-core (Maven)

Affected versions

< 0.30.0

Patched versions

0.30.0

Description

Using ktlint to download and execute custom rulesets can result in arbitrary code execution as the served jars can be compromised by a MITM. This attack is exploitable via Man in the Middle of the HTTP connection to the artifact servers. This vulnerability appears to have been fixed in 0.30.0 and later; after commit 5e547b287d6c260d328a2cb658dbe6b7a7ff2261.

References

Published to the GitHub Advisory Database Apr 8, 2019
Reviewed Jun 16, 2020
Last updated Jan 9, 2023

Severity

High
8.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2019-1010260

GHSA ID

GHSA-r8h9-hq9c-2p5c

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.