Skip to content
This repository was archived by the owner on Mar 5, 2024. It is now read-only.
This repository was archived by the owner on Mar 5, 2024. It is now read-only.

CVE-2023-4218 (Medium) detected in org.eclipse.core.runtime-3.19.0.jar #444

@mend-for-github-com

Description

@mend-for-github-com

CVE-2023-4218 - Medium Severity Vulnerability

Vulnerable Library - org.eclipse.core.runtime-3.19.0.jar

Core Runtime

Library home page: http://www.eclipse.org/platform

Path to dependency file: /dsl/gen/meta/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.platform/org.eclipse.core.runtime/3.19.0/87baae14592eeed8fd055f3faed99b0bab5cae64/org.eclipse.core.runtime-3.19.0.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.platform/org.eclipse.core.runtime/3.19.0/87baae14592eeed8fd055f3faed99b0bab5cae64/org.eclipse.core.runtime-3.19.0.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.platform/org.eclipse.core.runtime/3.19.0/87baae14592eeed8fd055f3faed99b0bab5cae64/org.eclipse.core.runtime-3.19.0.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.platform/org.eclipse.core.runtime/3.19.0/87baae14592eeed8fd055f3faed99b0bab5cae64/org.eclipse.core.runtime-3.19.0.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.platform/org.eclipse.core.runtime/3.19.0/87baae14592eeed8fd055f3faed99b0bab5cae64/org.eclipse.core.runtime-3.19.0.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.platform/org.eclipse.core.runtime/3.19.0/87baae14592eeed8fd055f3faed99b0bab5cae64/org.eclipse.core.runtime-3.19.0.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.platform/org.eclipse.core.runtime/3.19.0/87baae14592eeed8fd055f3faed99b0bab5cae64/org.eclipse.core.runtime-3.19.0.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.platform/org.eclipse.core.runtime/3.19.0/87baae14592eeed8fd055f3faed99b0bab5cae64/org.eclipse.core.runtime-3.19.0.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.platform/org.eclipse.core.runtime/3.19.0/87baae14592eeed8fd055f3faed99b0bab5cae64/org.eclipse.core.runtime-3.19.0.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.platform/org.eclipse.core.runtime/3.19.0/87baae14592eeed8fd055f3faed99b0bab5cae64/org.eclipse.core.runtime-3.19.0.jar

Dependency Hierarchy:

  • org.eclipse.xtext.xbase.testing-2.13.0.jar (Root Library)
    • org.eclipse.jdt.core-3.12.2.jar
      • org.eclipse.core.runtime-3.19.0.jar (Vulnerable Library)

Found in HEAD commit: 8d1e24260d1985acc52e5d1710bcc43fcf3848ca

Found in base branch: master

Vulnerability Details

In Eclipse IDE versions < 2023-09 (4.29) some files with xml content are parsed vulnerable against all sorts of XXE attacks. The user just needs to open any evil project or update an open project with a vulnerable file (for example for review a foreign repository or patch).

Publish Date: 2023-11-09

URL: CVE-2023-4218

CVSS 3 Score Details (5.0)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2023-4218

Release Date: 2023-11-09

Fix Resolution: org.eclipse.core.runtime:3.29.0

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions