CVE-2021-41034
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.
La compilación de algunas pilas de lenguaje de Eclipse Che versión 6, incluye una extracción de algunos binarios desde un endpoint HTTP no seguro. Como consecuencia, las compilaciones de dichos stacks son vulnerables a ataques de tipo MITM que permiten la sustitución de los binarios originales por otros arbitrarios. Las pilas implicadas son Java 8 (alpine y centos), Android y PHP. La vulnerabilidad no es explotable en tiempo de ejecución sino sólo cuando se construye el Che
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-09-13 CVE Reserved
- 2021-09-29 CVE Published
- 2024-06-14 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 | 2021-10-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Eclipse Search vendor "Eclipse" | Che Search vendor "Eclipse" for product "Che" | >= 6.0.0 < 7.0.0 Search vendor "Eclipse" for product "Che" and version " >= 6.0.0 < 7.0.0" | - |
Affected
|