logo

CVE-2019-10240 org.eclipse.hawkbit:hawkbit-boot-starter

Package

Manager: maven
Name: org.eclipse.hawkbit:hawkbit-boot-starter
Vulnerable Version: >=0 <0.3.0m2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00082 pctl0.24757

Details

Cleartext Transmission of Sensitive Information, Inclusion of Functionality from Untrusted Control Sphere , and Download of Code Without Integrity Check in Eclipse hawkBit Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected.

Metadata

Created: 2019-04-15T16:19:23Z
Modified: 2021-12-03T14:33:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/04/GHSA-jwqm-c9f2-2cq3/GHSA-jwqm-c9f2-2cq3.json
CWE IDs: ["CWE-319", "CWE-494", "CWE-829"]
Alternative ID: GHSA-jwqm-c9f2-2cq3
Finding: F332
Auto approve: 1