Command Injection Affecting org.apache.maven.shared:maven-shared-utils Open this link in a new tab package, versions [,3.3.3)


0.0
critical
  • Attack Complexity

    Low

  • Confidentiality

    High

  • Integrity

    High

  • Availability

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGAPACHEMAVENSHARED-570592

  • published

    22 Jun 2020

  • disclosed

    29 May 2020

  • credit

    Charles Duffy

How to fix?

Upgrade org.apache.maven.shared:maven-shared-utils to version 3.3.3 or higher.

Overview

org.apache.maven.shared:maven-shared-utils is a functional replacement for plexus-utils in Maven.

Affected versions of this package are vulnerable to Command Injection. The Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks. The BourneShell class should unconditionally single-quote emitted strings (including the name of the command itself being quoted), with {{'"'"'}} used for embedded single quotes, for maximum safety across shells implementing a superset of POSIX quoting rules.

This is a similar issue to SNYK-JAVA-ORGCODEHAUSPLEXUS-31522