CVE-2021-41034

The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:eclipse:che:*:*:*:*:*:*:*:*

History

07 Oct 2021, 20:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 8.1
CPE cpe:2.3:a:eclipse:che:*:*:*:*:*:*:*:*
CWE CWE-924
References (CONFIRM) https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 - (CONFIRM) https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 - Vendor Advisory

29 Sep 2021, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-09-29 22:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-41034

Mitre link : CVE-2021-41034

CVE.ORG link : CVE-2021-41034


JSON object : View

Products Affected

eclipse

  • che
CWE
CWE-924

Improper Enforcement of Message Integrity During Transmission in a Communication Channel