Description
A flaw was found in the fabric8-maven-plugin 4.0.0 and later. When using a wildfly-swarm or thorntail custom configuration, a malicious YAML configuration file on the local machine executing the maven plug-in could allow for deserialization of untrusted data resulting in arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5525 | A flaw was found in the fabric8-maven-plugin 4.0.0 and later. When using a wildfly-swarm or thorntail custom configuration, a malicious YAML configuration file on the local machine executing the maven plug-in could allow for deserialization of untrusted data resulting in arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Github GHSA |
GHSA-w7gj-h6f2-x4c6 | fabric8-maven-plugin: insecure way to construct Yaml Object leading to remote code execution |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:14:14.240Z
Reserved: 2020-03-20T00:00:00.000Z
Link: CVE-2020-10721
No data.
Status : Modified
Published: 2020-10-22T20:15:12.213
Modified: 2024-11-21T04:55:55.653
Link: CVE-2020-10721
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA