Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cjjm-2hw2-c3jx

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.

The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.

EPSS

Процентиль: 42%
0.00204
Низкий

Дефекты

CWE-924

Связанные уязвимости

CVSS3: 8.1
nvd
больше 4 лет назад

The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.

CVSS3: 8.1
fstec
больше 4 лет назад

Уязвимость сервера рабочей среды для разработчиков на основе Java Eclipse Che, связанная с отсутствием проверки целостности сообщений, позволяющая нарушителю проводить атаки типа "человек посередине"

EPSS

Процентиль: 42%
0.00204
Низкий

Дефекты

CWE-924