Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2019-0424 | Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected. |
![]() |
GHSA-jwqm-c9f2-2cq3 | Cleartext Transmission of Sensitive Information, Inclusion of Functionality from Untrusted Control Sphere , and Download of Code Without Integrity Check in Eclipse hawkBit |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://bugs.eclipse.org/bugs/show_bug.cgi?id=546053 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2024-08-04T22:17:19.603Z
Reserved: 2019-03-27T00:00:00
Link: CVE-2019-10240

No data.

Status : Modified
Published: 2019-04-03T18:29:17.503
Modified: 2024-11-21T04:18:43.300
Link: CVE-2019-10240

No data.

No data.