CVE-2020-10721 – io.fabric8:fabric8-maven-plugin
Package
Manager: maven
Name: io.fabric8:fabric8-maven-plugin
Vulnerable Version: >=4.0.0-m1 <=4.4.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00062 pctl0.19545
Details
fabric8-maven-plugin: insecure way to construct Yaml Object leading to remote code execution A flaw was found in the fabric8-maven-plugin 4.0.0 and later. When using a wildfly-swarm or thorntail custom configuration, a malicious YAML configuration file on the local machine executing the maven plug-in could allow for deserialization of untrusted data resulting in arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. The fabric8-maven-plugin has been superseded by the Eclipse project JKube and the recommendation is migrating users of the fabric8-maven-plugin to Eclipse Jkube >= 1.0.0
Metadata
Created: 2022-05-24T17:31:56Z
Modified: 2024-02-29T00:01:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w7gj-h6f2-x4c6/GHSA-w7gj-h6f2-x4c6.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-w7gj-h6f2-x4c6
Finding: F096
Auto approve: 1