GHSA-34m5-796p-mjcp

Suggest an improvement
Source
https://github.com/advisories/GHSA-34m5-796p-mjcp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-34m5-796p-mjcp/GHSA-34m5-796p-mjcp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-34m5-796p-mjcp
Aliases
  • CVE-2023-28935
Published
2023-03-30T12:30:15Z
Modified
2023-11-08T04:12:15.618838Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Apache UIMA DUCC allows remote code execution
Details

* UNSUPPORTED WHEN ASSIGNED * Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache UIMA DUCC. When using the "Distributed UIMA Cluster Computing" (DUCC) module of Apache UIMA, an authenticated user that has the permissions to modify core entities can cause command execution as the system user that runs the web process. As the "Distributed UIMA Cluster Computing" module for UIMA is retired, we do not plan to release a fix for this issue. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Database specific
{
    "nvd_published_at": "2023-03-30T10:15:00Z",
    "github_reviewed_at": "2023-03-30T21:44:38Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-77"
    ]
}
References

Affected packages

Maven / org.apache.uima:uima-ducc-parent

Package

Name
org.apache.uima:uima-ducc-parent
View open source insights on deps.dev
Purl
pkg:maven/org.apache.uima/uima-ducc-parent

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
3.0.0

Affected versions

1.*

1.0.0
1.1.0

2.*

2.0.0
2.0.1
2.1.0
2.2.0
2.2.1
2.2.2

3.*

3.0.0