{"api_version":"1","generated_at":"2026-04-22T21:27:00+00:00","cve":"CVE-2019-11770","urls":{"html":"https://cve.report/CVE-2019-11770","api":"https://cve.report/api/cve/CVE-2019-11770.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-11770","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-11770"},"summary":{"title":"CVE-2019-11770","description":"In Eclipse Buildship versions prior to 3.1.1, the build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifacts that were produced. Additionally, if any of these JARs or other dependencies were compromised, any developers using these could continue to be infected past updating to fix this.","state":"PUBLIC","assigner":"security@eclipse.org","published_at":"2019-06-14 14:29:00","updated_at":"2023-03-24 17:48:00"},"problem_types":["CWE-669"],"metrics":[],"references":[{"url":"https://github.com/eclipse/buildship/issues/855","name":"https://github.com/eclipse/buildship/issues/855","refsource":"CONFIRM","tags":["Exploit","Issue Tracking","Third Party Advisory"],"title":"Releases should not depend on insecure or untrusted code · Issue #855 · eclipse/buildship · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734","name":"https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"547734 – (CVE-2019-11770) Eclipse Buildship: New CVE Request","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-11770","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11770","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"11770","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"eclipse","cpe5":"buildship","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11770","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"eclipse","cpe5":"buildship","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@eclipse.org","ID":"CVE-2019-11770","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Eclipse Buildship","version":{"version_data":[{"version_affected":"<","version_value":"3.1.1"}]}}]},"vendor_name":"The Eclipse Foundation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Eclipse Buildship versions prior to 3.1.1, the build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifacts that were produced. Additionally, if any of these JARs or other dependencies were compromised, any developers using these could continue to be infected past updating to fix this."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-829: Inclusion of Functionality from Untrusted Control Sphere"}]}]},"references":{"reference_data":[{"name":"https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734","refsource":"CONFIRM","url":"https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734"},{"name":"https://github.com/eclipse/buildship/issues/855","refsource":"CONFIRM","url":"https://github.com/eclipse/buildship/issues/855"}]}},"nvd":{"publishedDate":"2019-06-14 14:29:00","lastModifiedDate":"2023-03-24 17:48:00","problem_types":["CWE-669"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:eclipse:buildship:*:*:*:*:*:*:*:*","versionEndExcluding":"3.1.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"11770","Ordinal":"150092","Title":"CVE-2019-11770","CVE":"CVE-2019-11770","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"11770","Ordinal":"1","NoteData":"In Eclipse Buildship versions prior to 3.1.1, the build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifacts that were produced. Additionally, if any of these JARs or other dependencies were compromised, any developers using these could continue to be infected past updating to fix this.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"11770","Ordinal":"2","NoteData":"2019-06-14","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"11770","Ordinal":"3","NoteData":"2019-06-14","Type":"Other","Title":"Modified"}]}}}