The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.
References
Link | Resource |
---|---|
https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 | Vendor Advisory |
https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 - Vendor Advisory |
07 Oct 2021, 20:35
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.1 |
CPE | cpe:2.3:a:eclipse:che:*:*:*:*:*:*:*:* | |
CWE | CWE-924 |
29 Sep 2021, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-29 22:15
Updated : 2024-11-21 06:25
NVD link : CVE-2021-41034
Mitre link : CVE-2021-41034
CVE.ORG link : CVE-2021-41034
JSON object : View
Products Affected
eclipse
- che
CWE
CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel