In Eclipse IDE versions < 2023-09 (4.29) some files with xml content are parsed vulnerable against all sorts of XXE attacks. The user just needs to open any evil project or update an open project with a vulnerable file (for example for review a foreign repository or patch).
{
"binaries": [
{
"binary_version": "3.8.1-8",
"binary_name": "eclipse"
},
{
"binary_version": "3.8.1-8",
"binary_name": "eclipse-jdt"
},
{
"binary_version": "3.8.1-8",
"binary_name": "eclipse-pde"
},
{
"binary_version": "3.8.1-8",
"binary_name": "eclipse-platform"
},
{
"binary_version": "3.8.1-8",
"binary_name": "eclipse-platform-data"
},
{
"binary_version": "3.8.1-8",
"binary_name": "eclipse-rcp"
},
{
"binary_version": "3.8.1-8",
"binary_name": "libequinox-osgi-java"
}
]
}
{
"binaries": [
{
"binary_version": "3.8.1-11",
"binary_name": "eclipse"
},
{
"binary_version": "3.8.1-11",
"binary_name": "eclipse-jdt"
},
{
"binary_version": "3.8.1-11",
"binary_name": "eclipse-pde"
},
{
"binary_version": "3.8.1-11",
"binary_name": "eclipse-platform"
},
{
"binary_version": "3.8.1-11",
"binary_name": "eclipse-platform-data"
},
{
"binary_version": "3.8.1-11",
"binary_name": "eclipse-rcp"
}
]
}