In Eclipse Buildship versions prior to 3.1.1, the build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifacts that were produced. Additionally, if any of these JARs or other dependencies were compromised, any developers using these could continue to be infected past updating to fix this.
References
Link | Resource |
---|---|
https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734 | Vendor Advisory |
https://github.com/eclipse/buildship/issues/855 | Exploit Issue Tracking Third Party Advisory |
https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734 | Vendor Advisory |
https://github.com/eclipse/buildship/issues/855 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734 - Vendor Advisory | |
References | () https://github.com/eclipse/buildship/issues/855 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2019-06-14 14:29
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11770
Mitre link : CVE-2019-11770
CVE.ORG link : CVE-2019-11770
JSON object : View
Products Affected
eclipse
- buildship