Arbitrary Code Execution Affecting org.codehaus.mojo:exec-maven-plugin Open this link in a new tab package, versions [,1.2)


0.0
high
  • Exploit Maturity

    Proof of concept

  • Attack Complexity

    High

  • Confidentiality

    High

  • Integrity

    High

  • Availability

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGCODEHAUSMOJO-540747

  • published

    6 Jan 2020

  • disclosed

    6 Jan 2020

  • credit

    Unknown

How to fix?

Upgrade org.codehaus.mojo:exec-maven-plugin to version 1.2 or higher.

Overview

org.codehaus.mojo:exec-maven-plugin is a plugin that provides 2 goals to help execute system and Java programs

Affected versions of this package are vulnerable to Arbitrary Code Execution via a crafted XML document because a configuration element (within a plugin element) can specify an arbitrary program in an executable element (and can also specify arbitrary command-line arguments in an arguments element).

References