First published: Wed Jan 03 2018(Updated: )
Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/plexus-utils2 | 3.1.1-1 3.3.0-1 3.4.2-1 | |
Plexus-utils Project Plexus-utils | <3.0.16 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
redhat/plexus-utils | <3.0.16 | 3.0.16 |
Codehaus-plexus Plexus-utils | <3.0.16 | |
maven/org.codehaus.plexus:plexus-utils | <3.0.16 | 3.0.16 |
https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.