Open mend-bolt-for-github[bot] opened 8 months ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2022-29599 - Critical Severity Vulnerability
Shared utils without any further dependencies
Path to dependency file: /jetty-maven-plugin/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/maven/shared/maven-shared-utils/3.2.1/maven-shared-utils-3.2.1.jar
Dependency Hierarchy: - maven-artifact-transfer-0.11.0.jar (Root Library) - maven-core-3.6.0.jar - :x: **maven-shared-utils-3.2.1.jar** (Vulnerable Library)
Found in HEAD commit: e4f77a76743d4b8fa6fe69cb1085577284ceb3e1
Found in base branch: master
In Apache Maven maven-shared-utils prior to version 3.3.3, the Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks.
Publish Date: 2022-05-23
URL: CVE-2022-29599
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Type: Upgrade version
Origin: https://github.com/advisories/GHSA-rhgr-952r-6p8q
Release Date: 2022-05-23
Fix Resolution: org.apache.maven.shared:maven-shared-utils:3.3.3
Step up your Open Source Security Game with Mend here