CVE-2020-10721

A flaw was found in the fabric8-maven-plugin 4.0.0 and later. When using a wildfly-swarm or thorntail custom configuration, a malicious YAML configuration file on the local machine executing the maven plug-in could allow for deserialization of untrusted data resulting in arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1827201 Issue Tracking Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1827201 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:fabric8-maven:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:55

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1827201 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1827201 - Issue Tracking, Vendor Advisory

Information

Published : 2020-10-22 20:15

Updated : 2024-11-21 04:55


NVD link : CVE-2020-10721

Mitre link : CVE-2020-10721

CVE.ORG link : CVE-2020-10721


JSON object : View

Products Affected

redhat

  • fabric8-maven
CWE
CWE-502

Deserialization of Untrusted Data