Description
In Apache Maven maven-shared-utils prior to version 3.3.3, the Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3059-1 | maven-shared-utils security update |
Debian DLA |
DLA-3086-1 | maven-shared-utils security update |
Debian DSA |
DSA-5242-1 | maven-shared-utils security update |
EUVD |
EUVD-2022-5176 | In Apache Maven maven-shared-utils prior to version 3.3.3, the Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks. |
Github GHSA |
GHSA-rhgr-952r-6p8q | Command injection in Apache Maven maven-shared-utils |
Ubuntu USN |
USN-6730-1 | Apache Maven Shared Utils vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T06:26:06.558Z
Reserved: 2022-04-24T00:00:00.000Z
Link: CVE-2022-29599
No data.
Status : Modified
Published: 2022-05-23T11:16:10.877
Modified: 2024-11-21T06:59:23.943
Link: CVE-2022-29599
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN