CVE-2022-48433

6.1 MEDIUM

📋 TL;DR

This vulnerability allows attackers to obtain NTLM password hashes through the built-in web server API in JetBrains IntelliJ IDEA. It affects users running vulnerable versions of IntelliJ IDEA who have the built-in web server enabled. The leaked hashes could be used for credential theft or pass-the-hash attacks.

💻 Affected Systems

Products:
  • JetBrains IntelliJ IDEA
Versions: All versions before 2023.1
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the built-in web server to be enabled and accessible. Most developers use this feature for local development.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain NTLM hashes and use them for lateral movement within the network, potentially compromising multiple systems through pass-the-hash attacks.

🟠

Likely Case

Local attackers or malware on the same system extract NTLM hashes, leading to credential theft and potential privilege escalation.

🟢

If Mitigated

With proper network segmentation and least privilege access, impact is limited to the local development environment.

🌐 Internet-Facing: LOW - The built-in web server is typically not exposed to the internet in development environments.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this if the web server is accessible on the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the web server API endpoint. No authentication bypass is needed beyond reaching the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.1 and later

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Open IntelliJ IDEA. 2. Go to Help > Check for Updates. 3. Install version 2023.1 or later. 4. Restart IntelliJ IDEA.

🔧 Temporary Workarounds

Disable Built-in Web Server

all

Prevent hash leakage by disabling the vulnerable web server component

Go to Settings/Preferences > Build, Execution, Deployment > Debugger > Built-in server and disable 'Allow unsigned requests' or disable the server entirely

Restrict Network Access

all

Limit web server access to localhost only

Configure firewall to block external access to port 63342 (default web server port)

🧯 If You Can't Patch

  • Disable the built-in web server in IntelliJ IDEA settings
  • Implement network segmentation to isolate development machines from production systems

🔍 How to Verify

Check if Vulnerable:

Check IntelliJ IDEA version in Help > About. If version is below 2023.1, the system is vulnerable.

Check Version:

On Windows: 'idea.exe --version' or check Help > About in the IDE

Verify Fix Applied:

Verify version is 2023.1 or higher in Help > About. Test that built-in web server still functions for development needs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to built-in web server API endpoints
  • Multiple failed authentication attempts following web server access

Network Indicators:

  • Unexpected external connections to port 63342
  • NTLM authentication traffic from development workstations

SIEM Query:

source="intellij.log" AND "Built-in server" AND ("NTLM" OR "hash" OR "authentication")

🔗 References

📤 Share & Export