Cross-Site Request Forgery (CSRF) Affecting org.eclipse.che:assembly-wsmaster-war Open this link in a new tab package, versions [6.16.0,7.3.1)


0.0
medium
  • Attack Complexity

    Low

  • User Interaction

    Required

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGECLIPSECHE-538427

  • published

    20 Dec 2019

  • disclosed

    19 Dec 2019

  • credit

    Unknown

How to fix?

Upgrade org.eclipse.che:assembly-wsmaster-war to version 7.3.1 or higher.

Overview

org.eclipse.che:assembly-wsmaster-war is a next-generation container development platform, developer workspace server and cloud IDE

Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF). With both authentication and TLS disabled, visiting a malicious web site could trigger the start of an arbitrary Che workspace. Che with no authentication and no TLS is not usually deployed on a public network but is often used for local installations (e.g. on personal laptops). In this case, even if the Che API is not exposed externally, some javascript running in the local browser is able to send requests to it.