First published: Thu Dec 01 2022(Updated: )
A flaw was found in codehaus-plexus. The `org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment` fails to sanitize comments for a `-->` sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Codehaus-plexus Project Codehaus-plexus | <3.0.24 | |
Redhat Integration Camel K | <1.10.1 | |
redhat/codehaus-plexus | <3.0.24 | 3.0.24 |
maven/org.codehaus.plexus:plexus-utils | <3.0.24 | 3.0.24 |
Codehaus-plexus Plexus-utils | <3.0.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4245 is a vulnerability found in codehaus-plexus that allows for XML injection.
CVE-2022-4245 affects codehaus-plexus by failing to sanitize comments for a `-->` sequence, allowing for potential XML injection.
The severity of CVE-2022-4245 is medium (CVSS score of 4).
To fix CVE-2022-4245, update codehaus-plexus to version 3.0.24 or higher.
You can find more information about CVE-2022-4245 at the following references: [Link 1](https://security.snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-461102), [Link 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2157638), [Link 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2157639).