{"api_version":"1","generated_at":"2026-04-22T12:03:19+00:00","cve":"CVE-2019-10102","urls":{"html":"https://cve.report/CVE-2019-10102","api":"https://cve.report/api/cve/CVE-2019-10102.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-10102","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-10102"},"summary":{"title":"CVE-2019-10102","description":"JetBrains Ktor framework (created using the Kotlin IDE template) versions before 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2019-07-03 20:15:00","updated_at":"2023-08-18 14:15:00"},"problem_types":["CWE-319"],"metrics":[],"references":[{"url":"https://security.netapp.com/advisory/ntap-20230818-0012/","name":"https://security.netapp.com/advisory/ntap-20230818-0012/","refsource":"CONFIRM","tags":[],"title":"July 2023 JetBrains Kotlin Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/","name":"https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/","refsource":"MISC","tags":["Vendor Advisory"],"title":"JetBrains Security Bulletin Q1 2019 | JetBrains News","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-10102","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10102","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"10102","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jetbrains","cpe5":"kotlin","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"10102","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jetbrains","cpe5":"kotlin","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"10102","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jetbrains","cpe5":"ktor","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"10102","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jetbrains","cpe5":"ktor","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2019-10102","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"JetBrains Ktor framework (created using the Kotlin IDE template) versions before 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/","url":"https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20230818-0012/","url":"https://security.netapp.com/advisory/ntap-20230818-0012/"}]}},"nvd":{"publishedDate":"2019-07-03 20:15:00","lastModifiedDate":"2023-08-18 14:15:00","problem_types":["CWE-319"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jetbrains:kotlin:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.30","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"10102","Ordinal":"148317","Title":"CVE-2019-10102","CVE":"CVE-2019-10102","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"10102","Ordinal":"1","NoteData":"JetBrains Ktor framework (created using the Kotlin IDE template) versions before 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"10102","Ordinal":"2","NoteData":"2019-07-03","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"10102","Ordinal":"3","NoteData":"2019-07-03","Type":"Other","Title":"Modified"}]}}}