If you are using the listed version or a higher one, then you need to update. A: We are not aware of similar vulnerabilities in older versions.Built-in web server was introduced in December 2012 (branch 129.x), and the above-mentioned and fixed internal RPC vulnerabilities did not exist in older versions.
The cross-site request forgery (CSRF) flaw in the IDE’s built-in webserver allowed an attacker to access local file system from a malicious web page without user consent.
Over-permissive CORS settings allowed attackers to use a malicious website in order to access various internal API endpoints, gain access to data saved by the IDE, and gather various meta-information like IDE version or open a project.
Our huge thanks go to Jordan Milne for disclosing these issues and working closely with us and to Android Studio team from Google for perfect collaboration while working on the fixes.
To install the update simply select ‘Check for Updates’ from inside the IDE or visit download the most recent version.
If you are using a version prior to 2016.1.x, read below for download links.
For more details about the security update and in case of additional questions, refer to the FAQ below. A: All Jet Brains products built on Intelli J Platform are affected.
The table below shows the minimum versions for which an update is released.
We have just released an important update for all Intelli J-based IDEs.
This update addresses critical security vulnerabilities inside the underlying Intelli J Platform.
The vulnerabilities, in various forms, are also present in older versions of the IDEs; therefore, patches for those are also available.
While we have had no reports of any active attacks against these vulnerabilities, we strongly recommend for all users to install the update as soon as possible.