Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-37051 PoC — JetBrains 多款集成开发环境安全漏洞

Source
Associated Vulnerability
Title:JetBrains 多款集成开发环境安全漏洞 (CVE-2024-37051)
Description:GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4
Description
Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051)
Readme
# CVE-2024-37051 Analysis

## Overview
CVE-2024-37051 is a vulnerability found in JetBrains' IntelliJ-based IDEs, affecting the GitHub plugin. It allows unauthorized exposure of GitHub access tokens when a malicious pull request (PR) is loaded.

## Technical Details
The vulnerability occurs during the rendering process of a PR in the IDE. Malicious PRs can cause the IDE to send GitHub tokens to an attacker's specified URL. The patch includes host validation to ensure tokens are sent only to authorized GitHub domains.

## Impact
The primary risk is unauthorized access to GitHub tokens, allowing attackers to access private repositories, modify code, and access sensitive data. This requires the user to load a malicious PR. Prompt updates to the latest IDE version and revoking existing tokens are recommended.

## Mitigation
- **Update IDE and GitHub Plugin**: Ensure you have the latest versions.
- **Revoke and Regenerate Tokens**: Prevent misuse of compromised tokens.

For more details, visit the [original analysis](https://leadroyal.cn/p/2403/).
File Snapshot

[4.0K] /data/pocs/8631b4591b3725f9b7b038facc91ceb843a38de4 ├── [ 16K] CVE-2024-37051.docx └── [1.0K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →