In Eclipse IDE versions < 2023-09 (4.29) some files with xml content are parsed vulnerable against all sorts of XXE attacks. The user just needs to open any evil project or update an open project with a vulnerable file (for example for review a foreign repository or patch).
{
"binaries": [
{
"binary_name": "eclipse",
"binary_version": "3.8.1-8"
},
{
"binary_name": "eclipse-jdt",
"binary_version": "3.8.1-8"
},
{
"binary_name": "eclipse-pde",
"binary_version": "3.8.1-8"
},
{
"binary_name": "eclipse-platform",
"binary_version": "3.8.1-8"
},
{
"binary_name": "eclipse-platform-data",
"binary_version": "3.8.1-8"
},
{
"binary_name": "eclipse-rcp",
"binary_version": "3.8.1-8"
},
{
"binary_name": "libequinox-osgi-java",
"binary_version": "3.8.1-8"
}
]
}
{
"binaries": [
{
"binary_name": "eclipse",
"binary_version": "3.8.1-11"
},
{
"binary_name": "eclipse-jdt",
"binary_version": "3.8.1-11"
},
{
"binary_name": "eclipse-pde",
"binary_version": "3.8.1-11"
},
{
"binary_name": "eclipse-platform",
"binary_version": "3.8.1-11"
},
{
"binary_name": "eclipse-platform-data",
"binary_version": "3.8.1-11"
},
{
"binary_name": "eclipse-rcp",
"binary_version": "3.8.1-11"
}
]
}