All Xtext & Xtend versions prior to 2.18.0 were built using HTTP instead of HTTPS file transfer and thus the built artifacts may have been compromised.
The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
Link | Tags |
---|---|
https://bugs.eclipse.org/bugs/show_bug.cgi?id=546996 | vendor advisory issue tracking |
https://github.com/eclipse/xtext-xtend/issues/759 | third party advisory issue tracking exploit |