The MojoHaus Exec Maven plugin 1.1.1 for Maven allows code execution via a crafted XML document because a configuration element (within a plugin element) can specify an arbitrary program in an executable element (and can also specify arbitrary command-line arguments in an arguments element).
References
Link | Resource |
---|---|
https://drive.google.com/open?id=0B5UvrSwn4wuwTnNqSzZESjIwZHo5ZXhWdHh2T2Z0eWRCT1hF | Third Party Advisory |
https://drive.google.com/open?id=1GLs0d9IGArMVrlbEGbxgCjA1MuzIJk-3 | Third Party Advisory |
https://www.mojohaus.org/exec-maven-plugin/ | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2020-01-06 14:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-20343
Mitre link : CVE-2019-20343
CVE.ORG link : CVE-2019-20343
JSON object : View
Products Affected
mojohaus
- exec_maven
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')