In Apache Maven maven-shared-utils prior to version 3.3.3, the Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks.
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
Link | Tags |
---|---|
https://issues.apache.org/jira/browse/MSHARED-297 | patch vendor advisory |
https://github.com/apache/maven-shared-utils/pull/40 | third party advisory patch |
http://www.openwall.com/lists/oss-security/2022/05/23/3 | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2022/08/msg00018.html | third party advisory mailing list |
https://www.debian.org/security/2022/dsa-5242 | third party advisory vendor advisory |