
Cloud Vulnerability DB
A community-led vulnerabilities database
In Apache Maven maven-shared-utils prior to version 3.3.3, a critical security vulnerability (CVE-2022-29599) was identified in the Commandline class. The vulnerability allows shell injection attacks due to improper escaping of double-quoted strings (CVE Details, NVD).
The vulnerability exists in the Commandline class where double-quoted strings are emitted without proper escaping mechanisms. The BourneShell class should unconditionally single-quote emitted strings, including the name of the command itself, using '"'"' for embedded single quotes to ensure maximum safety across shells implementing POSIX quoting rules. The vulnerability has been assigned a CVSS 3.1 base score of 9.8 (Critical) with attack vector being network-based, requiring low attack complexity and no user interaction (Ubuntu Security).
The vulnerability allows attackers to perform shell injection attacks, potentially leading to unauthorized command execution with high impact on system confidentiality, integrity, and availability (Ubuntu Security).
The vulnerability has been fixed in maven-shared-utils version 3.3.3. Users are strongly recommended to upgrade to this version or later. Various distributions have also released security updates, including Debian (version 3.3.0-1+deb11u1) and Ubuntu (versions vary by release) (Debian Security, Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."