You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /tmp/ws-scm/spring-boot/spring-boot-project/spring-boot/pom.xml
Path to vulnerable library: epository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar,epository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Path to dependency file: /tmp/ws-scm/spring-boot/spring-boot-project/spring-boot/pom.xml
Path to vulnerable library: epository/org/jetbrains/kotlin/kotlin-reflect/1.2.71/kotlin-reflect-1.2.71.jar,epository/org/jetbrains/kotlin/kotlin-reflect/1.2.71/kotlin-reflect-1.2.71.jar
Path to dependency file: /tmp/ws-scm/spring-boot/spring-boot-project/spring-boot-test/pom.xml
Path to vulnerable library: /root/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar,/root/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
JetBrains IntelliJ IDEA projects created using the Kotlin (JS Client/JVM Server) IDE Template were resolving Gradle artifacts using an http connection, potentially allowing an MITM attack. This issue, which was fixed in Kotlin plugin version 1.3.30, is similar to CVE-2019-10101.
CVE-2019-10103 - High Severity Vulnerability
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Library home page: https://kotlinlang.org/
Path to dependency file: /tmp/ws-scm/spring-boot/spring-boot-project/spring-boot/pom.xml
Path to vulnerable library: epository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar,epository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
kotlin-reflect-1.2.71.jar
Kotlin Full Reflection Library
Library home page: https://kotlinlang.org/
Path to dependency file: /tmp/ws-scm/spring-boot/spring-boot-project/spring-boot/pom.xml
Path to vulnerable library: epository/org/jetbrains/kotlin/kotlin-reflect/1.2.71/kotlin-reflect-1.2.71.jar,epository/org/jetbrains/kotlin/kotlin-reflect/1.2.71/kotlin-reflect-1.2.71.jar
Dependency Hierarchy:
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Library home page: https://kotlinlang.org/
Path to dependency file: /tmp/ws-scm/spring-boot/spring-boot-project/spring-boot-test/pom.xml
Path to vulnerable library: /root/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar,/root/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
Found in HEAD commit: 704515b08f76c8c866bd5ac9de9e14d3dda7d671
JetBrains IntelliJ IDEA projects created using the Kotlin (JS Client/JVM Server) IDE Template were resolving Gradle artifacts using an http connection, potentially allowing an MITM attack. This issue, which was fixed in Kotlin plugin version 1.3.30, is similar to CVE-2019-10101.
Publish Date: 2019-07-03
URL: CVE-2019-10103
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10103
Release Date: 2019-07-03
Fix Resolution: 1.3.30
The text was updated successfully, but these errors were encountered: