In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code.
References
Link | Resource |
---|---|
https://github.com/eclipse-theia/theia/issues/7954 | Exploit Issue Tracking Third Party Advisory |
https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/ | Exploit Third Party Advisory |
https://github.com/eclipse-theia/theia/issues/7954 | Exploit Issue Tracking Third Party Advisory |
https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/eclipse-theia/theia/issues/7954 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/ - Exploit, Third Party Advisory |
Information
Published : 2021-02-24 17:15
Updated : 2024-11-21 05:20
NVD link : CVE-2020-27224
Mitre link : CVE-2020-27224
CVE.ORG link : CVE-2020-27224
JSON object : View
Products Affected
eclipse
- theia
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')