First published: Wed Jan 03 2018(Updated: )
Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/plexus-utils2 | 3.1.1-1 3.3.0-1 3.4.2-1 | |
redhat/plexus-utils | <3.0.16 | 3.0.16 |
maven/org.codehaus.plexus:plexus-utils | <3.0.16 | 3.0.16 |
Plexus-utils | <3.0.16 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Plexus-utils | <3.0.16 |
https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000487 is classified as a command injection vulnerability that can potentially allow an attacker to execute arbitrary commands.
To fix CVE-2017-1000487, upgrade to Plexus-utils version 3.0.16 or later.
Versions of Plexus-utils before 3.0.16 are affected by CVE-2017-1000487.
Yes, users of Debian versions 7.0, 8.0, and 9.0 with affected Plexus-utils installations are vulnerable to CVE-2017-1000487.
CVE-2017-1000487 can facilitate remote command execution attacks by improperly processing double quoted strings.