You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@maven.apache.org by "Dwayne E Culbertson (Jira)" <ji...@apache.org> on 2021/06/03 12:53:00 UTC
[jira] [Created] (MNG-7168) SONATYPE-2020-0491
Dwayne E Culbertson created MNG-7168:
----------------------------------------
Summary: SONATYPE-2020-0491
Key: MNG-7168
URL: https://issues.apache.org/jira/browse/MNG-7168
Project: Maven
Issue Type: Bug
Reporter: Dwayne E Culbertson
h4. EXPLANATION
The {{maven-shared-utils}} package is vulnerable to Command Injection. The constructor and {{unifyQuotes()}} method in the {{BourneShell}} class and the {{getRawCommandLine()}} and {{getShellCommandLine()}} methods in the {{Shell}} class fail to escape double-quoted arguments emitted from {{Commandline}}. A remote attacker can exploit this behavior to execute arbitrary commands by supplying a combination of shell metacharacters and commands via any affected input parameter.
h4. DETECTION
The application is vulnerable by using this component.
h4. RECOMMENDATION
We recommend upgrading to a version of this component that is not vulnerable to this specific issue.
Note: If this component is included as a bundled/transitive dependency of another component, there may not be an upgrade path. In this instance, we recommend contacting the maintainers who included the vulnerable package. Alternatively, we recommend investigating alternative components or a potential mitigating control.
h4. ROOT CAUSE
apache-maven-3.8.1-bin.zipapache-maven-3.8.1/lib/maven-shared-utils-3.2.1.jarorg/apache/maven/shared/utils/cli/shell/Shell.class( , 3.3.3)
h4. ADVISORIES
Project:[https://github.com/apache/maven-shared-utils/pull/40]
Project:https://issues.apache.org/jira/browse/MSHARED-297
h4. CVSS DETAILS
Sonatype CVSS 3:9.8
CVSS Vector:CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
--
This message was sent by Atlassian Jira
(v8.3.4#803005)