Описание
codehaus-plexus vulnerable to XML injection
A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to sanitize comments for a --> sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2022-4245
- https://github.com/codehaus-plexus/plexus-utils/issues/3
- https://github.com/codehaus-plexus/plexus-utils/commit/f933e5e78dc2637e485447ed821fe14904f110de
- https://access.redhat.com/errata/RHSA-2023:2135
- https://access.redhat.com/errata/RHSA-2023:3906
- https://access.redhat.com/security/cve/CVE-2022-4245
- https://bugzilla.redhat.com/show_bug.cgi?id=2149843
- https://security.snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-461102
Пакеты
org.codehaus.plexus:plexus-utils
< 3.0.24
3.0.24
Связанные уязвимости
A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to sanitize comments for a --> sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection.
A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to sanitize comments for a --> sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection.
A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to sanitize comments for a --> sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection.
A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml. ...
Уязвимость библиотеки codehaus-plexus фреймворка Apache Maven, связана с неверным ограничением XML-ссылок на внешние объекты, позволяющая нарушителю выполнить произвольный код