Arbitrary Code Execution Affecting org.codehaus.mojo:exec-maven-plugin package, versions [,1.2)


0.0
high

Snyk CVSS

    Attack Complexity High
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    Exploit Maturity Proof of concept
    EPSS 1.15% (85th percentile)
Expand this section
NVD
9.8 critical

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGCODEHAUSMOJO-540747
  • published 6 Jan 2020
  • disclosed 6 Jan 2020
  • credit Unknown

How to fix?

Upgrade org.codehaus.mojo:exec-maven-plugin to version 1.2 or higher.

Overview

org.codehaus.mojo:exec-maven-plugin is a plugin that provides 2 goals to help execute system and Java programs

Affected versions of this package are vulnerable to Arbitrary Code Execution via a crafted XML document because a configuration element (within a plugin element) can specify an arbitrary program in an executable element (and can also specify arbitrary command-line arguments in an arguments element).

References