Description
A flaw was found in the fabric8-maven-plugin 4.0.0 and later. When using a wildfly-swarm or thorntail custom configuration, a malicious YAML configuration file on the local machine executing the maven plug-in could allow for deserialization of untrusted data resulting in arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Published: 2020-10-22
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-5525 A flaw was found in the fabric8-maven-plugin 4.0.0 and later. When using a wildfly-swarm or thorntail custom configuration, a malicious YAML configuration file on the local machine executing the maven plug-in could allow for deserialization of untrusted data resulting in arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Github GHSA Github GHSA GHSA-w7gj-h6f2-x4c6 fabric8-maven-plugin: insecure way to construct Yaml Object leading to remote code execution
History

No history.

Subscriptions

Redhat Fabric8-maven
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T11:14:14.240Z

Reserved: 2020-03-20T00:00:00.000Z

Link: CVE-2020-10721

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-22T20:15:12.213

Modified: 2024-11-21T04:55:55.653

Link: CVE-2020-10721

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-10-20T17:51:00Z

Links: CVE-2020-10721 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses