René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

116 lines
3.6 KiB
JSON

{
"id": "CVE-2021-41034",
"sourceIdentifier": "emo@eclipse.org",
"published": "2021-09-29T22:15:07.367",
"lastModified": "2021-10-07T20:35:06.457",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che."
},
{
"lang": "es",
"value": "La compilaci\u00f3n de algunas pilas de lenguaje de Eclipse Che versi\u00f3n 6, incluye una extracci\u00f3n de algunos binarios desde un endpoint HTTP no seguro. Como consecuencia, las compilaciones de dichos stacks son vulnerables a ataques de tipo MITM que permiten la sustituci\u00f3n de los binarios originales por otros arbitrarios. Las pilas implicadas son Java 8 (alpine y centos), Android y PHP. La vulnerabilidad no es explotable en tiempo de ejecuci\u00f3n sino s\u00f3lo cuando se construye el Che"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-924"
}
]
},
{
"source": "emo@eclipse.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-924"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:eclipse:che:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndExcluding": "7.0.0",
"matchCriteriaId": "27CF1583-CC8A-408D-977D-5039879B886C"
}
]
}
]
}
],
"references": [
{
"url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989",
"source": "emo@eclipse.org",
"tags": [
"Vendor Advisory"
]
}
]
}