High severityGHSA Advisory· Published Oct 22, 2020· Updated Aug 4, 2024
CVE-2020-10721
CVE-2020-10721
Description
A flaw was found in the fabric8-maven-plugin 4.0.0 and later. When using a wildfly-swarm or thorntail custom configuration, a malicious YAML configuration file on the local machine executing the maven plug-in could allow for deserialization of untrusted data resulting in arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
io.fabric8:fabric8-maven-pluginMaven | >= 4.0.0-M1, <= 4.4.2 | — |
Affected products
1- Range: >= 4.0.0-M1, <= 4.4.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-w7gj-h6f2-x4c6ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-10721ghsaADVISORY
- bugzilla.redhat.com/show_bug.cgighsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.