Filtered by vendor Eclipse Subscriptions
Filtered by product Theia Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2021-41038 1 Eclipse 1 Theia 2024-11-21 6.1 Medium
In versions of the @theia/plugin-ext component of Eclipse Theia prior to 1.18.0, Webview contents can be hijacked via postMessage().
CVE-2021-34436 1 Eclipse 1 Theia 2024-11-21 9.8 Critical
In Eclipse Theia 0.1.1 to 0.2.0, it is possible to exploit the default build to obtain remote code execution (and XXE) via the theia-xml-extension. This extension uses lsp4xml (recently renamed to LemMinX) in order to provide language support for XML. This is installed by default.
CVE-2021-34435 1 Eclipse 1 Theia 2024-11-21 8.8 High
In Eclipse Theia 0.3.9 to 1.8.1, the "mini-browser" extension allows a user to preview HTML files in an iframe inside the IDE. But with the way it is made it is possible for a previewed HTML file to trigger an RCE. This exploit only happens if a user previews a malicious file..
CVE-2021-28162 1 Eclipse 1 Theia 2024-11-21 6.1 Medium
In Eclipse Theia versions up to and including 0.16.0, in the notification messages there is no HTML escaping, so Javascript code can run.
CVE-2021-28161 1 Eclipse 1 Theia 2024-11-21 6.1 Medium
In Eclipse Theia versions up to and including 1.8.0, in the debug console there is no HTML escaping, so arbitrary Javascript code can be injected.
CVE-2020-27224 1 Eclipse 1 Theia 2024-11-21 9.6 Critical
In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code.
CVE-2019-17636 1 Eclipse 1 Theia 2024-11-21 8.1 High
In Eclipse Theia versions 0.3.9 through 0.15.0, one of the default pre-packaged Theia extensions is "Mini-Browser", published as "@theia/mini-browser" on npmjs.com. This extension, for its own needs, exposes a HTTP endpoint that allows to read the content of files on the host's filesystem, given their path, without restrictions on the requester's origin. This design is vulnerable to being exploited remotely through a DNS rebinding attack or a drive-by download of a carefully crafted exploit.