hshivhare67 / jetty_v9.4.31_27223

Other
0 stars 0 forks source link

CVE-2022-29599 (Critical) detected in maven-shared-utils-3.2.1.jar #66

Open mend-bolt-for-github[bot] opened 11 months ago

mend-bolt-for-github[bot] commented 11 months ago

CVE-2022-29599 - Critical Severity Vulnerability

Vulnerable Library - maven-shared-utils-3.2.1.jar

Shared utils without any further dependencies

Path to dependency file: /jetty-maven-plugin/pom.xml

Path to vulnerable library: /jetty-maven-plugin/pom.xml

Dependency Hierarchy: - maven-artifact-transfer-0.11.0.jar (Root Library) - maven-core-3.6.0.jar - :x: **maven-shared-utils-3.2.1.jar** (Vulnerable Library)

Found in HEAD commit: b976400adf459c779b88fa83118b68aa39af14c7

Found in base branch: master

Vulnerability Details

In Apache Maven maven-shared-utils prior to version 3.3.3, the Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks.

Publish Date: 2022-05-23

URL: CVE-2022-29599

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-rhgr-952r-6p8q

Release Date: 2022-05-23

Fix Resolution: org.apache.maven.shared:maven-shared-utils:3.3.3


Step up your Open Source Security Game with Mend here