CVE-2020-14368
HIGHEclipse Che < 7.14.0 - Cross-Site Request Forgery via SameSite Cookie Misconfiguration
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2020-14368. PoCs published by codingchili.
AI-analyzed exploit summary This repository contains a writeup describing a cross-site websocket hijacking vulnerability (CVE-2020-14368) in Eclipse CHE and Theia. The vulnerability allows attackers to hijack websocket connections due to lack of cross-site checks or in-channel authentication.
Description
A flaw was found in Eclipse Che in versions prior to 7.14.0 that impacts CodeReady Workspaces. When configured with cookies authentication, Theia IDE doesn't properly set the SameSite value, allowing a Cross-Site Request Forgery (CSRF) and consequently allowing a cross-site WebSocket hijack on Theia IDE. This flaw allows an attacker to gain full access to the victim's workspace through the /services endpoint. To perform a successful attack, the attacker conducts a Man-in-the-middle attack (MITM) and tricks the victim into executing a request via an untrusted link, which performs the CSRF and the Socket hijack. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Exploits (1)
This repository contains a writeup describing a cross-site websocket hijacking vulnerability (CVE-2020-14368) in Eclipse CHE and Theia. The vulnerability allows attackers to hijack websocket connections due to lack of cross-site checks or in-channel authentication.
References (1)
Scores
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H