Snootch17 / jdbc

Apache License 2.0
0 stars 0 forks source link

CVE-2019-20343 (High) detected in exec-maven-plugin-1.2.1.jar - autoclosed #5

Closed mend-for-github-com[bot] closed 2 years ago

mend-for-github-com[bot] commented 2 years ago

CVE-2019-20343 - High Severity Vulnerability

Vulnerable Library - exec-maven-plugin-1.2.1.jar

A plugin to allow execution of system and Java programs

Path to dependency file: jdbc/public_pom.xml

Path to vulnerable library: r/.m2/repository/org/codehaus/mojo/exec-maven-plugin/1.2.1/exec-maven-plugin-1.2.1.jar

Dependency Hierarchy: - :x: **exec-maven-plugin-1.2.1.jar** (Vulnerable Library)

Found in HEAD commit: aa40092028e95cb7f705790daf7b10cd7b553a85

Found in base branch: master

Vulnerability Details

The MojoHaus Exec Maven plugin 1.1.1 for Maven allows code execution via a crafted XML document because a configuration element (within a plugin element) can specify an arbitrary program in an executable element (and can also specify arbitrary command-line arguments in an arguments element).

Publish Date: 2020-01-06

URL: CVE-2019-20343

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2019-20343

Release Date: 2020-01-15

Fix Resolution: org.codehaus.mojo:exec-maven-plugin - 3.0.0


mend-for-github-com[bot] commented 2 years ago

:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.