A flaw was found in the fabric8-maven-plugin 4.0.0 and later. When using a wildfly-swarm or thorntail custom configuration, a malicious YAML configuration file on the local machine executing the maven plug-in could allow for deserialization of untrusted data resulting in arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5525 | A flaw was found in the fabric8-maven-plugin 4.0.0 and later. When using a wildfly-swarm or thorntail custom configuration, a malicious YAML configuration file on the local machine executing the maven plug-in could allow for deserialization of untrusted data resulting in arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Github GHSA |
GHSA-w7gj-h6f2-x4c6 | fabric8-maven-plugin: insecure way to construct Yaml Object leading to remote code execution |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:14:14.240Z
Reserved: 2020-03-20T00:00:00
Link: CVE-2020-10721
No data.
Status : Modified
Published: 2020-10-22T20:15:12.213
Modified: 2024-11-21T04:55:55.653
Link: CVE-2020-10721
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA