Description
The MojoHaus Exec Maven plugin 1.1.1 for Maven allows code execution via a crafted XML document because a configuration element (within a plugin element) can specify an arbitrary program in an executable element (and can also specify arbitrary command-line arguments in an arguments element).
Remediation
References
https://drive.google.com/open?id=0B5UvrSwn4wuwTnNqSzZESjIwZHo5ZXhWdHh2T2Z0eWRCT1hF
https://drive.google.com/open?id=1GLs0d9IGArMVrlbEGbxgCjA1MuzIJk-3
https://www.mojohaus.org/exec-maven-plugin/
Related Vulnerabilities
CVE-2016-10693 Vulnerability in npm package pm2-kafka
CVE-2019-20363 Vulnerability in maven package org.igniterealtime.openfire:xmppserver
CVE-2017-10910 Vulnerability in maven package org.webjars.npm:mqtt
CVE-2023-30513 Vulnerability in maven package org.csanchez.jenkins.plugins:kubernetes
CVE-2020-1957 Vulnerability in maven package org.apache.shiro:shiro-web