CVE-2019-11770

In Eclipse Buildship versions prior to 3.1.1, the build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifacts that were produced. Additionally, if any of these JARs or other dependencies were compromised, any developers using these could continue to be infected past updating to fix this.
References
Link Resource
https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734 Vendor Advisory
https://github.com/eclipse/buildship/issues/855 Exploit Issue Tracking Third Party Advisory
https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734 Vendor Advisory
https://github.com/eclipse/buildship/issues/855 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:eclipse:buildship:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:21

Type Values Removed Values Added
References () https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734 - Vendor Advisory () https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734 - Vendor Advisory
References () https://github.com/eclipse/buildship/issues/855 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/eclipse/buildship/issues/855 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2019-06-14 14:29

Updated : 2024-11-21 04:21


NVD link : CVE-2019-11770

Mitre link : CVE-2019-11770

CVE.ORG link : CVE-2019-11770


JSON object : View

Products Affected

eclipse

  • buildship
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere

CWE-669

Incorrect Resource Transfer Between Spheres