Vulnerability Details : CVE-2017-1000487
Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.
Products affected by CVE-2017-1000487
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:codehaus-plexus:plexus-utils:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-1000487
0.40%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 73 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-1000487
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2017-1000487
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-1000487
-
https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf%40%3Ccommits.pulsar.apache.org%3E
[GitHub] [pulsar] GLouMcK opened a new issue #9347: Security Vulnerabilities - Black Duck Scan-Apache Mail Archives
-
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E
[GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list-Apache Mail Archives
-
https://access.redhat.com/errata/RHSA-2018:1322
RHSA-2018:1322 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62%40%3Cdev.avro.apache.org%3E
[jira] [Created] (AVRO-2865) Security vulnerability caused by plexus-utils:1.5.6-Apache Mail Archives
-
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
[GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list - Pony MailMailing List;Third Party Advisory
-
https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31522
Shell Command Injection in org.codehaus.plexus:plexus-utils | SnykPatch;Third Party Advisory
-
https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E
[GitHub] [pulsar] GLouMcK opened a new issue #9347: Security Vulnerabilities - Black Duck Scan - Pony MailMailing List;Third Party Advisory
-
https://www.debian.org/security/2018/dsa-4146
Debian -- Security Information -- DSA-4146-1 plexus-utilsThird Party Advisory
-
https://www.debian.org/security/2018/dsa-4149
Debian -- Security Information -- DSA-4149-1 plexus-utils2Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/01/msg00011.html
[SECURITY] [DLA 1237-1] plexus-utils2 security updateMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/01/msg00010.html
[SECURITY] [DLA 1236-1] plexus-utils security updateMailing List;Third Party Advisory
-
https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62@%3Cdev.avro.apache.org%3E
[jira] [Created] (AVRO-2865) Security vulnerability caused by plexus-utils:1.5.6 - Pony MailMailing List;Third Party Advisory
-
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E
[GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities - Pony MailMailing List;Third Party Advisory
-
https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
[PLXUTILS-161] Commandline shell injection problems · codehaus-plexus/plexus-utils@b38a1b3 · GitHubPatch;Third Party Advisory
-
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
[GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities-Apache Mail Archives
Jump to