First published: Thu Apr 23 2020(Updated: )
A flaw was found in the fabric8-maven-plugin 4.0.0 and later. When using a wildfly-swarm or thorntail custom configuration, a malicious YAML configuration file on the local machine executing the maven plug-in could allow for deserialization of untrusted data resulting in arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jkube | <1.0.0 | 1.0.0 |
Redhat Fabric8-maven | >=4.0.0<=4.4.1 | |
maven/io.fabric8:fabric8-maven-plugin | >=4.0.0-M1<=4.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.