4 results (0.007 seconds)

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che. La compilación de algunas pilas de lenguaje de Eclipse Che versión 6, incluye una extracción de algunos binarios desde un endpoint HTTP no seguro. • https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 • CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 1

A flaw was found in Eclipse Che in versions prior to 7.14.0 that impacts CodeReady Workspaces. When configured with cookies authentication, Theia IDE doesn't properly set the SameSite value, allowing a Cross-Site Request Forgery (CSRF) and consequently allowing a cross-site WebSocket hijack on Theia IDE. This flaw allows an attacker to gain full access to the victim's workspace through the /services endpoint. To perform a successful attack, the attacker conducts a Man-in-the-middle attack (MITM) and tricks the victim into executing a request via an untrusted link, which performs the CSRF and the Socket hijack. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. • https://github.com/codingchili/CVE-2020-14368 https://bugzilla.redhat.com/show_bug.cgi?id=1823892 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

A flaw was found in the Eclipse Che up to version 7.8.x, where it did not properly restrict access to workspace pods. An authenticated user can exploit this flaw to bypass JWT proxy and gain access to the workspace pods of another user. Successful exploitation requires knowledge of the service name and namespace of the target pod. Se detectó un fallo en el Eclipse Che versiones hasta 7.8.x, donde no se restringe apropiadamente el acceso a unos pods del espacio de trabajo. Un usuario autenticado puede explotar este fallo para omitir un proxy JWT y conseguir acceso a los pods del espacio de trabajo de otro usuario. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10689 https://github.com/eclipse/che/issues/15651 https://access.redhat.com/security/cve/CVE-2020-10689 https://bugzilla.redhat.com/show_bug.cgi?id=1816789 • CWE-862: Missing Authorization •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 2

For Eclipse Che versions 6.16 to 7.3.0, with both authentication and TLS disabled, visiting a malicious web site could trigger the start of an arbitrary Che workspace. Che with no authentication and no TLS is not usually deployed on a public network but is often used for local installations (e.g. on personal laptops). In that case, even if the Che API is not exposed externally, some javascript running in the local browser is able to send requests to it. Para Eclipse Che versiones 6.16 hasta 7.3.0, con la autenticación y TLS deshabilitadas, visitar un sitio web malicioso podría activar el inicio de un espacio de trabajo Che arbitrario. El Che sin autenticación y sin TLS generalmente no se implementa en una red pública, pero a menudo es usado para instalaciones locales (por ejemplo, en computadoras portátiles personales). • https://github.com/mgrube/CVE-2019-17633 https://bugs.eclipse.org/bugs/show_bug.cgi?id=551596 • CWE-352: Cross-Site Request Forgery (CSRF) •