CVE-2017-1000487 (High) detected in plexus-utils-2.0.4.jar #27
Labels
good first issue
Good for newcomers
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2017-1000487 - High Severity Vulnerability
Vulnerable Library - plexus-utils-2.0.4.jar
A collection of various utility classes to ease working with strings, files, command lines, XML and more.
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/codehaus/plexus/plexus-utils/2.0.4/plexus-utils-2.0.4.jar
Dependency Hierarchy:
Found in HEAD commit: 160e69822964b88ff887ba903106f5fc169a5abf
Found in base branch: main
Vulnerability Details
Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.
Publish Date: 2018-01-03
URL: CVE-2017-1000487
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2017-1000487
Release Date: 2018-01-03
Fix Resolution: 3.0.16
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: