Логотип exploitDog
bind:CVE-2021-41034
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-41034

Количество 3

Количество 3

nvd логотип

CVE-2021-41034

больше 4 лет назад

The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-cjjm-2hw2-c3jx

больше 3 лет назад

The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.

EPSS: Низкий
fstec логотип

BDU:2021-05108

больше 4 лет назад

Уязвимость сервера рабочей среды для разработчиков на основе Java Eclipse Che, связанная с отсутствием проверки целостности сообщений, позволяющая нарушителю проводить атаки типа "человек посередине"

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-41034

The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.

CVSS3: 8.1
0%
Низкий
больше 4 лет назад
github логотип
GHSA-cjjm-2hw2-c3jx

The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-05108

Уязвимость сервера рабочей среды для разработчиков на основе Java Eclipse Che, связанная с отсутствием проверки целостности сообщений, позволяющая нарушителю проводить атаки типа "человек посередине"

CVSS3: 8.1
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу