Bug 2149843 (CVE-2022-4245)
Summary: | CVE-2022-4245 codehaus-plexus: XML External Entity (XXE) Injection | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sandipan Roy <saroy> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aileenc, alazarot, anstephe, asoldano, ataylor, avibelli, balejosg, bbaranow, bgeorges, bmaxwell, boliveir, brian.stansberry, cdewolf, chazlett, clement.escoffier, cmoulliard, csutherl, dandread, darran.lofthouse, dkreling, dosoudil, emingora, eric.wittmann, fjuma, fmongiar, gjospin, gmalinko, gsmet, gzaronik, hamadhan, hhorak, ibek, ikanello, iweiss, janstey, jclere, jnethert, jorton, jpavlik, jpechane, jpoth, jrokos, jross, jstastny, jwon, kverlaen, lgao, lthon, max.andersen, mizdebsk, mmadzin, mnovotny, mosmerov, msochure, msvehla, nwallace, pantinor, pdelbell, pdrozd, peholase, pgallagh, pjindal, pmackay, probinso, pskopek, rguimara, rkieley, rruss, rstancel, rsvoboda, sbiarozk, sdouglas, smaestri, sthorger, szappis, tcunning, tom.jenkinson, yfang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | codehaus-plexus 3.0.24 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to sanitize comments for a --> sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-06-28 20:18:23 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2156483, 2156484, 2156485, 2156486, 2156488, 2156489, 2156491, 2157638, 2157639, 2157640, 2157641, 2157642, 2157643, 2157644 | ||
Bug Blocks: | 2149832 |
Description
Sandipan Roy
2022-12-01 06:45:39 UTC
Created extra-enforcer-rules tracking bugs for this issue: Affects: fedora-37 [bug 2157638] Created maven tracking bugs for this issue: Affects: fedora-37 [bug 2157639] Created maven-antrun-plugin tracking bugs for this issue: Affects: fedora-37 [bug 2157640] Created maven-compiler-plugin tracking bugs for this issue: Affects: fedora-37 [bug 2157641] Created maven-plugin-bundle tracking bugs for this issue: Affects: fedora-37 [bug 2157642] Created maven-source-plugin tracking bugs for this issue: Affects: fedora-37 [bug 2157643] Created pomchecker tracking bugs for this issue: Affects: fedora-37 [bug 2157644] adjusting RHPAM from OOSS to affected/delegated per request from engineering in https://issues.redhat.com/browse/RHDM-1949. This issue has been addressed in the following products: RHINT Camel-K-1.10.1 Via RHSA-2023:3906 https://access.redhat.com/errata/RHSA-2023:3906 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-4245 The component is shipped in rhint-camel-spring-boot-3 but its not used. Changing specific impact to low. |