GHSA-w7gj-h6f2-x4c6

Suggest an improvement
Source
https://github.com/advisories/GHSA-w7gj-h6f2-x4c6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w7gj-h6f2-x4c6/GHSA-w7gj-h6f2-x4c6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-w7gj-h6f2-x4c6
Aliases
  • CVE-2020-10721
Published
2022-05-24T17:31:56Z
Modified
2024-02-29T00:26:38.429270Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
fabric8-maven-plugin: insecure way to construct Yaml Object leading to remote code execution
Details

A flaw was found in the fabric8-maven-plugin 4.0.0 and later. When using a wildfly-swarm or thorntail custom configuration, a malicious YAML configuration file on the local machine executing the maven plug-in could allow for deserialization of untrusted data resulting in arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

The fabric8-maven-plugin has been superseded by the Eclipse project JKube and the recommendation is migrating users of the fabric8-maven-plugin to Eclipse Jkube >= 1.0.0

Database specific
{
    "nvd_published_at": "2020-10-22T20:15:00Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-02-29T00:01:33Z"
}
References

Affected packages

Maven / io.fabric8:fabric8-maven-plugin

Package

Name
io.fabric8:fabric8-maven-plugin
View open source insights on deps.dev
Purl
pkg:maven/io.fabric8/fabric8-maven-plugin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.0.0-M1
Last affected
4.4.2

Affected versions

4.*

4.0.0-M1
4.0.0-M2
4.0.0
4.1.0
4.2.0
4.3.0
4.3.1
4.4.0
4.4.1
4.4.2