Learn about CVE-2019-11404 where Arrow-kt Arrow before version 0.9.0 resolved Gradle build artifacts over HTTP, potentially exposing them to tampering. Find mitigation steps and impact details here.
Arrow-kt Arrow before version 0.9.0 had a vulnerability where it resolved Gradle build artifacts over HTTP, making them susceptible to potential tampering through a MITM attack.
Understanding CVE-2019-11404
In versions earlier than 0.9.0, arrow-kt used HTTP to resolve Gradle build artifacts, such as compiling and building the published JARs, leading to a security vulnerability.
What is CVE-2019-11404?
This CVE refers to the use of HTTP instead of HTTPS by arrow-kt Arrow before version 0.9.0 to resolve Gradle build artifacts, potentially exposing them to malicious tampering.
The Impact of CVE-2019-11404
The vulnerability had a high impact on confidentiality, integrity, and availability, as dependent artifacts could be compromised by an MITM attack.
Technical Details of CVE-2019-11404
Arrow-kt Arrow's vulnerability details and affected systems.
Vulnerability Description
The vulnerability allowed for potential malicious tampering of dependent artifacts through a MITM attack due to resolving Gradle build artifacts over HTTP.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability could be exploited through a MITM attack on the HTTP resolution of Gradle build artifacts, enabling malicious tampering.
Mitigation and Prevention
Steps to mitigate and prevent the CVE-2019-11404 vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure all systems are updated to arrow-kt Arrow version 0.9.0 or above to address the vulnerability.