First published: Tue Apr 14 2020(Updated: )
A flaw was found in Eclipse Che in versions prior to 7.14.0 that impacts CodeReady Workspaces. When configured with cookies authentication, Theia IDE doesn't properly set the SameSite value, allowing a Cross-Site Request Forgery (CSRF) and consequently allowing a cross-site WebSocket hijack on Theia IDE. This flaw allows an attacker to gain full access to the victim's workspace through the /services endpoint. To perform a successful attack, the attacker conducts a Man-in-the-middle attack (MITM) and tricks the victim into executing a request via an untrusted link, which performs the CSRF and the Socket hijack. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/che-theia | <7.14.0 | 7.14.0 |
Eclipse Che | <7.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14368 is a vulnerability found in Eclipse Che that impacts CodeReady Workspaces.
CVE-2020-14368 has a severity rating of 7.1 (high).
CVE-2020-14368 allows a cross-site WebSocket hijack on Theia IDE when configured with cookies authentication in Eclipse Che.
To fix CVE-2020-14368, update to Eclipse Che version 7.14.0 or later.
You can find more information about CVE-2020-14368 on the following references: [Link 1](https://github.com/eclipse/che-theia/commit/f9409ac45f977bfb745520f5826c18d41024ebcd), [Link 2](https://issues.redhat.com/projects/CRW?selectedItem=com.atlassian.jira.jira-projects-plugin:release-page&status=released-unreleased), [Link 3](https://issues.redhat.com/browse/CRW-1176)