Cross-Site Request Forgery (CSRF) Affecting org.eclipse.che:assembly-wsmaster-war package, versions [6.16.0,7.3.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.54% (67th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-Site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGECLIPSECHE-538427
  • published20 Dec 2019
  • disclosed19 Dec 2019
  • creditUnknown

Introduced: 19 Dec 2019

CVE-2019-17633  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

Upgrade org.eclipse.che:assembly-wsmaster-war to version 7.3.1 or higher.

Overview

org.eclipse.che:assembly-wsmaster-war is a next-generation container development platform, developer workspace server and cloud IDE

Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF). With both authentication and TLS disabled, visiting a malicious web site could trigger the start of an arbitrary Che workspace. Che with no authentication and no TLS is not usually deployed on a public network but is often used for local installations (e.g. on personal laptops). In this case, even if the Che API is not exposed externally, some javascript running in the local browser is able to send requests to it.

CVSS Base Scores

version 3.1