← Back to CVEs
CVE-2017-1000487
CRITICAL9.8
Description
Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published1/3/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
codehaus-plexus:plexus-utilsdebian:debian_linux
Weaknesses (CWE)
CWE-78
References
https://access.redhat.com/errata/RHSA-2018:1322(cve@mitre.org)
https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41(cve@mitre.org)
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E(cve@mitre.org)
https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62%40%3Cdev.avro.apache.org%3E(cve@mitre.org)
https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf%40%3Ccommits.pulsar.apache.org%3E(cve@mitre.org)
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E(cve@mitre.org)
https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31522(cve@mitre.org)
https://www.debian.org/security/2018/dsa-4146(cve@mitre.org)
https://www.debian.org/security/2018/dsa-4149(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2018:1322(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62%40%3Cdev.avro.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf%40%3Ccommits.pulsar.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/01/msg00010.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/01/msg00011.html(af854a3a-2127-422b-91ae-364da2661108)
https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31522(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4146(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4149(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.