Name | CVE-2022-4245 |
Description | A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to sanitize comments for a --> sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | ELA-963-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
plexus-utils2 (PTS) | jessie, jessie (lts) | 3.0.15-1+deb8u2 | fixed |
| stretch (lts), stretch | 3.0.22-1+deb9u1 | fixed |
| buster | 3.1.1-1 | fixed |
| bullseye | 3.3.0-1 | fixed |
| sid, trixie, bookworm | 3.4.2-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://security.snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-461102
https://github.com/codehaus-plexus/plexus-utils/commit/f933e5e78dc2637e485447ed821fe14904f110de (plexus-utils-3.0.24)
https://github.com/codehaus-plexus/plexus-utils/issues/3