In Eclipse IDE versions < 2023-09 (4.29) some files with xml content are parsed vulnerable against all sorts of XXE attacks. The user just needs to open any evil project or update an open project with a vulnerable file (for example for review a foreign repository or patch).
{ "binaries": [ { "binary_version": "3.8.1-8", "binary_name": "eclipse" }, { "binary_version": "3.8.1-8", "binary_name": "eclipse-jdt" }, { "binary_version": "3.8.1-8", "binary_name": "eclipse-pde" }, { "binary_version": "3.8.1-8", "binary_name": "eclipse-platform" }, { "binary_version": "3.8.1-8", "binary_name": "eclipse-platform-data" }, { "binary_version": "3.8.1-8", "binary_name": "eclipse-rcp" }, { "binary_version": "3.8.1-8", "binary_name": "libequinox-osgi-java" } ] }
{ "binaries": [ { "binary_version": "3.8.1-11", "binary_name": "eclipse" }, { "binary_version": "3.8.1-11", "binary_name": "eclipse-jdt" }, { "binary_version": "3.8.1-11", "binary_name": "eclipse-pde" }, { "binary_version": "3.8.1-11", "binary_name": "eclipse-platform" }, { "binary_version": "3.8.1-11", "binary_name": "eclipse-platform-data" }, { "binary_version": "3.8.1-11", "binary_name": "eclipse-rcp" } ] }