Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-0424 Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected.
Github GHSA Github GHSA GHSA-jwqm-c9f2-2cq3 Cleartext Transmission of Sensitive Information, Inclusion of Functionality from Untrusted Control Sphere , and Download of Code Without Integrity Check in Eclipse hawkBit
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: eclipse

Published:

Updated: 2024-08-04T22:17:19.603Z

Reserved: 2019-03-27T00:00:00

Link: CVE-2019-10240

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-04-03T18:29:17.503

Modified: 2024-11-21T04:18:43.300

Link: CVE-2019-10240

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.