A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to sanitize comments for a --> sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection.
The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:2135 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2023:3906 | third party advisory vendor advisory |
https://access.redhat.com/security/cve/CVE-2022-4245 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2149843 | third party advisory issue tracking |