Arbitrary Code Execution via Malicious YAML Configuration in fabric8-maven-plugin

Arbitrary Code Execution via Malicious YAML Configuration in fabric8-maven-plugin

CVE-2020-10721 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

A flaw was found in the fabric8-maven-plugin 4.0.0 and later. When using a wildfly-swarm or thorntail custom configuration, a malicious YAML configuration file on the local machine executing the maven plug-in could allow for deserialization of untrusted data resulting in arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Learn more about our Web Application Penetration Testing UK.