Skip to content

codehaus-plexus vulnerable to XML injection

Moderate severity GitHub Reviewed Published Sep 25, 2023 to the GitHub Advisory Database • Updated May 3, 2024

Package

maven org.codehaus.plexus:plexus-utils (Maven)

Affected versions

< 3.0.24

Patched versions

3.0.24

Description

A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to sanitize comments for a --> sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection.

References

Published by the National Vulnerability Database Sep 25, 2023
Published to the GitHub Advisory Database Sep 25, 2023
Reviewed Sep 26, 2023
Last updated May 3, 2024

Severity

Moderate
4.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE ID

CVE-2022-4245

GHSA ID

GHSA-jcwr-x25h-x5fh
Checking history
See something to contribute? Suggest improvements for this vulnerability.