CVE-2022-29599
Commandline class shell injection vulnerabilities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Apache Maven maven-shared-utils prior to version 3.3.3, the Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks.
En Apache Maven maven-shared-utils versiones anteriores a 3.3.3, la clase Commandline puede emitir cadenas con comillas dobles sin un escape apropiado, permitiendo ataques de inyección de shell
A flaw was found in the maven-shared-utils package. This issue allows a Command Injection due to improper escaping, allowing a shell injection attack.
Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Issues addressed include bypass, code execution, cross site request forgery, cross site scripting, denial of service, deserialization, information leakage, and insecure permissions vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-04-24 CVE Reserved
- 2022-04-27 CVE Published
- 2024-08-03 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
- CWE-116: Improper Encoding or Escaping of Output
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2022/05/23/3 | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2022/08/msg00018.html | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/apache/maven-shared-utils/pull/40 | 2023-09-28 | |
https://issues.apache.org/jira/browse/MSHARED-297 | 2023-09-28 |
URL | Date | SRC |
---|---|---|
https://www.debian.org/security/2022/dsa-5242 | 2023-09-28 | |
https://access.redhat.com/security/cve/CVE-2022-29599 | 2024-02-12 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2066479 | 2024-02-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Maven Shared Utils Search vendor "Apache" for product "Maven Shared Utils" | < 3.3.3 Search vendor "Apache" for product "Maven Shared Utils" and version " < 3.3.3" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 11.0 Search vendor "Debian" for product "Debian Linux" and version "11.0" | - |
Affected
|