Cross-Site Request Forgery (CSRF) Affecting org.eclipse.che:assembly-wsmaster-war package, versions [6.16.0,7.3.1)


0.0
medium

Snyk CVSS

    Attack Complexity Low
    User Interaction Required
Expand this section
NVD
8.8 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGECLIPSECHE-538427
  • published 20 Dec 2019
  • disclosed 19 Dec 2019
  • credit Unknown

How to fix?

Upgrade org.eclipse.che:assembly-wsmaster-war to version 7.3.1 or higher.

Overview

org.eclipse.che:assembly-wsmaster-war is a next-generation container development platform, developer workspace server and cloud IDE

Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF). With both authentication and TLS disabled, visiting a malicious web site could trigger the start of an arbitrary Che workspace. Che with no authentication and no TLS is not usually deployed on a public network but is often used for local installations (e.g. on personal laptops). In this case, even if the Che API is not exposed externally, some javascript running in the local browser is able to send requests to it.