A flaw was found in the fabric8-maven-plugin 4.0.0 and later. When using a wildfly-swarm or thorntail custom configuration, a malicious YAML configuration file on the local machine executing the maven plug-in could allow for deserialization of untrusted data resulting in arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1827201 | Issue Tracking Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1827201 | Issue Tracking Vendor Advisory |
Configurations
History
21 Nov 2024, 04:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1827201 - Issue Tracking, Vendor Advisory |
Information
Published : 2020-10-22 20:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10721
Mitre link : CVE-2020-10721
CVE.ORG link : CVE-2020-10721
JSON object : View
Products Affected
redhat
- fabric8-maven
CWE
CWE-502
Deserialization of Untrusted Data