By the Year
In 2024 there have been 0 vulnerabilities in Eclipse Che . Che did not have any published security vulnerabilities last year.
It may take a day or so for new Che vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Eclipse Che Security Vulnerabilities
The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint
8.1 - High
- September 29, 2021
The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
A flaw was found in Eclipse Che in versions prior to 7.14.0 that impacts CodeReady Workspaces
7.1 - High
- December 14, 2020
A flaw was found in Eclipse Che in versions prior to 7.14.0 that impacts CodeReady Workspaces. When configured with cookies authentication, Theia IDE doesn't properly set the SameSite value, allowing a Cross-Site Request Forgery (CSRF) and consequently allowing a cross-site WebSocket hijack on Theia IDE. This flaw allows an attacker to gain full access to the victim's workspace through the /services endpoint. To perform a successful attack, the attacker conducts a Man-in-the-middle attack (MITM) and tricks the victim into executing a request via an untrusted link, which performs the CSRF and the Socket hijack. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
A flaw was found in the Eclipse Che up to version 7.8.x, where it did not properly restrict access to workspace pods
6.8 - Medium
- April 03, 2020
A flaw was found in the Eclipse Che up to version 7.8.x, where it did not properly restrict access to workspace pods. An authenticated user can exploit this flaw to bypass JWT proxy and gain access to the workspace pods of another user. Successful exploitation requires knowledge of the service name and namespace of the target pod.
For Eclipse Che versions 6.16 to 7.3.0
8.8 - High
- December 19, 2019