logo

CVE-2019-5475 org.sonatype.nexus.plugins:nexus-yum-repository-plugin

Package

Manager: maven
Name: org.sonatype.nexus.plugins:nexus-yum-repository-plugin
Vulnerable Version: >=0 <2.14.14

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.56844 pctl0.98052

Details

OS Command Injection in Nexus Yum Repository Plugin The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability.

Metadata

Created: 2019-09-11T23:04:57Z
Modified: 2021-08-17T22:25:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/09/GHSA-g5m7-57ph-j6p8/GHSA-g5m7-57ph-j6p8.json
CWE IDs: ["CWE-78"]
Alternative ID: GHSA-g5m7-57ph-j6p8
Finding: F404
Auto approve: 1