CVE-2022-4245: codehaus-plexus vulnerable to XML injection
(updated )
A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to sanitize comments for a –> sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection.
References
- access.redhat.com/errata/RHSA-2023:3906
- access.redhat.com/security/cve/CVE-2022-4245
- bugzilla.redhat.com/show_bug.cgi?id=2149843
- github.com/advisories/GHSA-jcwr-x25h-x5fh
- github.com/codehaus-plexus/plexus-utils/commit/f933e5e78dc2637e485447ed821fe14904f110de
- github.com/codehaus-plexus/plexus-utils/issues/3
- nvd.nist.gov/vuln/detail/CVE-2022-4245
- security.snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-461102
Detect and mitigate CVE-2022-4245 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →