Vulnerability Description
In Eclipse Ditto versions 3.0.0 to 3.5.5, the user input of several input fields of the Eclipse Ditto Explorer User Interface https://eclipse.dev/ditto/user-interface.html was not properly neutralized and thus vulnerable to both Reflected and Stored XSS (Cross Site Scripting). Several inputs were not persisted at the backend of Eclipse Ditto, but only in local browser storage to save settings of "environments" of the UI and e.g. the last performed "search queries", resulting in a "Reflected XSS" vulnerability. However, several other inputs were persisted at the backend of Eclipse Ditto, leading to a "Stored XSS" vulnerability. Those mean that authenticated and authorized users at Eclipse Ditto can persist Things in Ditto which can - when being displayed by other users also being authorized to see those Things in the Eclipse Ditto UI - cause scripts to be executed in the browser of other users.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eclipse | Ditto | >= 3.0.0, < 3.5.6 |
Related Weaknesses (CWE)
References
- https://gitlab.eclipse.org/security/cve-assignement/-/issues/23Issue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201ExploitIssue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202ExploitIssue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204ExploitIssue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207ExploitIssue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209ExploitIssue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210ExploitIssue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/211ExploitIssue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/cve-assignement/-/issues/23Issue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201ExploitIssue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202ExploitIssue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204ExploitIssue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207ExploitIssue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209ExploitIssue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210ExploitIssue TrackingVendor Advisory
FAQ
What is CVE-2024-5165?
CVE-2024-5165 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In Eclipse Ditto versions 3.0.0 to 3.5.5, the user input of several input fields of the Eclipse Ditto Explorer User Interface https://eclipse.dev/ditto/user-interface.html was not properly neutraliz...
How severe is CVE-2024-5165?
CVE-2024-5165 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-5165?
Check the references section above for vendor advisories and patch information. Affected products include: Eclipse Ditto.