Show plain JSON{"id": "CVE-2019-11770", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.2}]}, "published": "2019-06-14T14:29:00.530", "references": [{"url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734", "tags": ["Vendor Advisory"], "source": "emo@eclipse.org"}, {"url": "https://github.com/eclipse/buildship/issues/855", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"], "source": "emo@eclipse.org"}, {"url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/eclipse/buildship/issues/855", "tags": ["Exploit", "Issue Tracking", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "emo@eclipse.org", "description": [{"lang": "en", "value": "CWE-829"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-669"}]}], "descriptions": [{"lang": "en", "value": "In Eclipse Buildship versions prior to 3.1.1, the build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifacts that were produced. Additionally, if any of these JARs or other dependencies were compromised, any developers using these could continue to be infected past updating to fix this."}, {"lang": "es", "value": "En Eclipse Buildship versiones anteriores a 3.1.1, los archivos de compilaci\u00f3n indican que este proyecto est\u00e1 resolviendo dependencias por medio HTTP en lugar de HTTPS. Cualquiera de estos artefactos pudiera presentar un MITM para comprometerlos maliciosamente e infectar los artefactos de compilaci\u00f3n que fueron producidos. Adem\u00e1s, si alguna de estas JAR u otras dependencias se vieron comprometidas, cualquier desarrollador que las utilice podr\u00eda continuar infectando la anterior actualizaci\u00f3n para corregir este problema."}], "lastModified": "2024-11-21T04:21:45.587", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:eclipse:buildship:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBF9674F-C2C1-4616-8D8E-F0377906955C", "versionEndExcluding": "3.1.1"}], "operator": "OR"}]}], "sourceIdentifier": "emo@eclipse.org"}