Vulnerability Details CVE-2024-50573
In JetBrains Hub before 2024.3.47707 improper access control allowed users to generate permanent tokens for unauthorized services
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 0.0%
CVSS Severity
CVSS v3 Score 4.3
Products affected by CVE-2024-50573
-
cpe:2.3:a:jetbrains:hub:-
-
cpe:2.3:a:jetbrains:hub:1.0.648
-
cpe:2.3:a:jetbrains:hub:1.0.739
-
cpe:2.3:a:jetbrains:hub:1.0.749
-
cpe:2.3:a:jetbrains:hub:1.0.770
-
cpe:2.3:a:jetbrains:hub:1.0.797
-
cpe:2.3:a:jetbrains:hub:1.0.809
-
cpe:2.3:a:jetbrains:hub:2.0.182
-
cpe:2.3:a:jetbrains:hub:2.0.314
-
cpe:2.3:a:jetbrains:hub:2.5.330
-
cpe:2.3:a:jetbrains:hub:2.5.359
-
cpe:2.3:a:jetbrains:hub:2.5.450
-
cpe:2.3:a:jetbrains:hub:2.5.456
-
cpe:2.3:a:jetbrains:hub:2017.1
-
cpe:2.3:a:jetbrains:hub:2017.1.4524
-
cpe:2.3:a:jetbrains:hub:2017.1.4711
-
cpe:2.3:a:jetbrains:hub:2017.2
-
cpe:2.3:a:jetbrains:hub:2017.3
-
cpe:2.3:a:jetbrains:hub:2017.4
-
cpe:2.3:a:jetbrains:hub:2018.1
-
cpe:2.3:a:jetbrains:hub:2018.3
-
cpe:2.3:a:jetbrains:hub:2018.4.11298
-
cpe:2.3:a:jetbrains:hub:2018.4.11436
-
cpe:2.3:a:jetbrains:hub:2019.1
-
cpe:2.3:a:jetbrains:hub:2019.1.11738
-
cpe:2.3:a:jetbrains:hub:2020.1.12099
-
cpe:2.3:a:jetbrains:hub:2020.1.12629
-
cpe:2.3:a:jetbrains:hub:2020.1.12669
-
cpe:2.3:a:jetbrains:hub:2021.1.13415
-
cpe:2.3:a:jetbrains:hub:2021.1.13690
-
cpe:2.3:a:jetbrains:hub:2022.1.14638
-
cpe:2.3:a:jetbrains:hub:2022.1.15583
-
cpe:2.3:a:jetbrains:hub:2022.2
-
cpe:2.3:a:jetbrains:hub:2022.2.14799
-
cpe:2.3:a:jetbrains:hub:2022.2.14815
-
cpe:2.3:a:jetbrains:hub:2022.2.14830
-
cpe:2.3:a:jetbrains:hub:2022.2.14835
-
cpe:2.3:a:jetbrains:hub:2022.2.14897
-
cpe:2.3:a:jetbrains:hub:2022.2.14932
-
cpe:2.3:a:jetbrains:hub:2022.2.14968
-
cpe:2.3:a:jetbrains:hub:2022.2.15003
-
cpe:2.3:a:jetbrains:hub:2022.2.15023
-
cpe:2.3:a:jetbrains:hub:2022.2.15032
-
cpe:2.3:a:jetbrains:hub:2022.2.15039
-
cpe:2.3:a:jetbrains:hub:2022.2.15087
-
cpe:2.3:a:jetbrains:hub:2022.2.15088
-
cpe:2.3:a:jetbrains:hub:2022.2.15572
-
cpe:2.3:a:jetbrains:hub:2022.3
-
cpe:2.3:a:jetbrains:hub:2022.3.15354
-
cpe:2.3:a:jetbrains:hub:2022.3.15362
-
cpe:2.3:a:jetbrains:hub:2022.3.15381
-
cpe:2.3:a:jetbrains:hub:2022.3.15435
-
cpe:2.3:a:jetbrains:hub:2022.3.15453
-
cpe:2.3:a:jetbrains:hub:2022.3.15481
-
cpe:2.3:a:jetbrains:hub:2022.3.15499
-
cpe:2.3:a:jetbrains:hub:2022.3.15573
-
cpe:2.3:a:jetbrains:hub:2023.1
-
cpe:2.3:a:jetbrains:hub:2023.1.15725
-
cpe:2.3:a:jetbrains:hub:2023.1.15741
-
cpe:2.3:a:jetbrains:hub:2023.1.15792
-
cpe:2.3:a:jetbrains:hub:2023.1.15805
-
cpe:2.3:a:jetbrains:hub:2023.1.15821
-
cpe:2.3:a:jetbrains:hub:2023.1.15832
-
cpe:2.3:a:jetbrains:hub:2023.1.15849
-
cpe:2.3:a:jetbrains:hub:2023.1.15863
-
cpe:2.3:a:jetbrains:hub:2023.1.15868
-
cpe:2.3:a:jetbrains:hub:2023.1.15900
-
cpe:2.3:a:jetbrains:hub:2023.1.16479
-
cpe:2.3:a:jetbrains:hub:2023.1.16990
-
cpe:2.3:a:jetbrains:hub:2023.1.17146
-
cpe:2.3:a:jetbrains:hub:2023.1.17568
-
cpe:2.3:a:jetbrains:hub:2023.2
-
cpe:2.3:a:jetbrains:hub:2023.2.18873
-
cpe:2.3:a:jetbrains:hub:2023.2.19187
-
cpe:2.3:a:jetbrains:hub:2023.2.19677
-
cpe:2.3:a:jetbrains:hub:2023.2.20112
-
cpe:2.3:a:jetbrains:hub:2023.2.20300
-
cpe:2.3:a:jetbrains:hub:2023.3
-
cpe:2.3:a:jetbrains:hub:2023.3.21798
-
cpe:2.3:a:jetbrains:hub:2023.3.22912
-
cpe:2.3:a:jetbrains:hub:2023.3.23062
-
cpe:2.3:a:jetbrains:hub:2024.1
-
cpe:2.3:a:jetbrains:hub:2024.1.25076
-
cpe:2.3:a:jetbrains:hub:2024.1.26266
-
cpe:2.3:a:jetbrains:hub:2024.1.26828
-
cpe:2.3:a:jetbrains:hub:2024.1.27971
-
cpe:2.3:a:jetbrains:hub:2024.1.28928
-
cpe:2.3:a:jetbrains:hub:2024.1.29548
-
cpe:2.3:a:jetbrains:hub:2024.1.32323
-
cpe:2.3:a:jetbrains:hub:2024.1.34109
-
cpe:2.3:a:jetbrains:hub:2024.2
-
cpe:2.3:a:jetbrains:hub:2024.2.33606
-
cpe:2.3:a:jetbrains:hub:2024.2.34646
-
cpe:2.3:a:jetbrains:hub:2024.2.35237
-
cpe:2.3:a:jetbrains:hub:2024.2.35661
-
cpe:2.3:a:jetbrains:hub:2024.2.35942
-
cpe:2.3:a:jetbrains:hub:2024.2.37269
-
cpe:2.3:a:jetbrains:hub:2024.2.38971
-
cpe:2.3:a:jetbrains:hub:2024.2.40106
-
cpe:2.3:a:jetbrains:hub:2024.2.41254
-
cpe:2.3:a:jetbrains:hub:2024.2.42544