Skip to content

XXE in eclipse.platform / Eclipse IDE

see https://github.com/eclipse-platform/eclipse.platform/security/advisories/GHSA-j24h-xcpc-9jw8#advisory-comment-85007

Please add project leads to confirm this:

Basic information

Project name: Eclipse Platform, Eclipse IDE

Project id: eclipse.platform

Request type: publication

Versions affected: org.eclipse.core.runtime < 3.29.0, Eclipse IDE < 4.29, Eclipse IDE < 2023-09

Common Weakness Enumeration:

Common Vulnerability Scoring System: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

Summary:

In Eclipse IDE versions < 2023-09 (4.29) some files with xml content are parsed vulnerable against all sorts of XXE attacks. The user just needs to open any evil project or update an open project with a vulnerable file (for example for review a foreign repository or patch).

Links:

Tracking

This section will completed by the project team.

  • Reserve an entry only
  • We're ready for this issue to be reported to the central authority (i.e., make this public now)

Note that for those projects that host their repositories on GitHub, the use of GitHub Security Advisories is recommended but is not required.

This section will be completed by the EMO.

CVE: {cve}

  • All required information is provided
  • CVE Assigned
  • Pushed to Mitre
Edited by Marta Rybczynska
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information