Arbitrary Code Execution Affecting org.codehaus.mojo:exec-maven-plugin package, versions [,1.2)


0.0
high

Snyk CVSS

    Exploit Maturity Proof of concept
    Attack Complexity High
    Confidentiality High
    Integrity High
    Availability High
Expand this section
NVD
9.8 critical

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGCODEHAUSMOJO-540747
  • published 6 Jan 2020
  • disclosed 6 Jan 2020
  • credit Unknown

How to fix?

Upgrade org.codehaus.mojo:exec-maven-plugin to version 1.2 or higher.

Overview

org.codehaus.mojo:exec-maven-plugin is a plugin that provides 2 goals to help execute system and Java programs

Affected versions of this package are vulnerable to Arbitrary Code Execution via a crafted XML document because a configuration element (within a plugin element) can specify an arbitrary program in an executable element (and can also specify arbitrary command-line arguments in an arguments element).

References