CVE-2021-30006
📋 TL;DR
This CVE describes an XML External Entity (XXE) vulnerability in IntelliJ IDEA that allows attackers to read arbitrary files from the system. It affects users running IntelliJ IDEA versions before 2020.3.3 who process untrusted XML files within the IDE.
💻 Affected Systems
- IntelliJ IDEA
📦 What is this software?
Intellij Idea by Jetbrains
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through arbitrary file read, potentially exposing sensitive configuration files, credentials, or source code.
Likely Case
Information disclosure of local files accessible to the IDE process, potentially including project files, configuration data, or system files.
If Mitigated
Limited impact with proper input validation and XML parser configuration preventing external entity expansion.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious XML file) and knowledge of the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2020.3.3 and later
Vendor Advisory: https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/
Restart Required: Yes
Instructions:
1. Open IntelliJ IDEA. 2. Go to Help > Check for Updates. 3. Install version 2020.3.3 or later. 4. Restart the IDE when prompted.
🔧 Temporary Workarounds
Disable XML external entity processing
allConfigure XML parsers to disable external entity expansion
Not applicable - configuration through IDE settings or code modifications
Avoid processing untrusted XML files
allOnly open XML files from trusted sources within IntelliJ IDEA
🧯 If You Can't Patch
- Implement strict input validation for XML files
- Use network segmentation to limit access to sensitive systems from affected workstations
🔍 How to Verify
Check if Vulnerable:
Check IntelliJ IDEA version in Help > About. If version is below 2020.3.3, system is vulnerable.
Check Version:
On Linux/macOS: grep -i version ~/.IntelliJIdea*/config/options/ide.general.xml | head -1
Verify Fix Applied:
Verify version is 2020.3.3 or higher in Help > About dialog.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns from IntelliJ IDEA process
- XML parsing errors with external entity references
Network Indicators:
- Outbound connections to unexpected external entities during XML processing
SIEM Query:
process_name:"idea.exe" OR process_name:"idea" AND (event_type:"file_access" AND file_path:"/etc/passwd" OR file_path:"C:\\Windows\\System32\\config\\SAM")