Description
The MojoHaus Exec Maven plugin 1.1.1 for Maven allows code execution via a crafted XML document because a configuration element (within a plugin element) can specify an arbitrary program in an executable element (and can also specify arbitrary command-line arguments in an arguments element).
Remediation
References
https://drive.google.com/open?id=0B5UvrSwn4wuwTnNqSzZESjIwZHo5ZXhWdHh2T2Z0eWRCT1hF
https://drive.google.com/open?id=1GLs0d9IGArMVrlbEGbxgCjA1MuzIJk-3
https://www.mojohaus.org/exec-maven-plugin/
Related Vulnerabilities
CVE-2019-10760 Vulnerability in maven package org.webjars.npm:safer-eval
CVE-2017-20162 Vulnerability in npm package ms
CVE-2019-9512 Vulnerability in maven package io.netty:netty-codec-http2
CVE-2019-19771 Vulnerability in npm package baes-x
CVE-2022-28366 Vulnerability in maven package org.codelibs:nekohtml