The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.
References
| Link | Resource |
|---|---|
| https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 | Vendor Advisory |
| https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:25
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 - Vendor Advisory |
07 Oct 2021, 20:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | (CONFIRM) https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.1 |
| CPE | cpe:2.3:a:eclipse:che:*:*:*:*:*:*:*:* | |
| CWE | CWE-924 |
29 Sep 2021, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2021-09-29 22:15
Updated : 2024-11-21 06:25
NVD link : CVE-2021-41034
Mitre link : CVE-2021-41034
CVE.ORG link : CVE-2021-41034
JSON object : View
Products Affected
eclipse
- che
CWE
CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
