Miggo Logo

CVE-2022-29599: Command injection in Apache Maven maven-shared-utils

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.59607%
Published
5/24/2022
Updated
6/30/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.maven.shared:maven-shared-utilsmaven< 3.3.33.3.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper argument escaping in the Commandline class's shell implementation. The GitHub pull request #40 and JIRA MSHARED-297 specifically show modifications to BourneShell's quoteArgument method, changing from double-quote-based escaping to POSIX-compliant single-quote escaping with proper handling of embedded single quotes. The CVE description explicitly mentions improper escaping of double-quoted strings in Commandline class emissions, which aligns with the BourneShell's argument quoting mechanism being the vulnerable component.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In *p**** M*v*n m*v*n-s**r**-utils prior to v*rsion *.*.*, t** *omm*n*lin* *l*ss **n *mit *ou*l*-quot** strin*s wit*out prop*r *s**pin*, *llowin* s**ll inj**tion *tt**ks.

Reasoning

T** vuln*r**ility st*ms *rom improp*r *r*um*nt *s**pin* in t** `*omm*n*lin*` *l*ss's s**ll impl*m*nt*tion. T** *it*u* pull r*qu*st #** *n* JIR* MS**R**-*** sp**i*i**lly s*ow mo*i*i**tions to `*ourn*S**ll`'s `quot**r*um*nt` m*t*o*, ***n*in* *rom *ou*l