RHEL 8:maven:3.5 (RHSA-2022: 4798)

critical Nessus 插件 ID 161674

简介

远程 Red Hat 主机缺少安全更新。

描述

远程 Redhat Enterprise Linux 8 主机上安装的多个程序包受到 RHSA-2022: 4798 公告中提及的一个漏洞影响。

- 在低于 3.3.3 版本的 Apache Maven maven-shared-utils 中,Commandline 类可在未经正确转义的情况下发出双引号字符串,从而允许执行 shell 注入攻击。(CVE-2022-29599)

请注意,Nessus 尚未测试此问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

http://www.nessus.org/u?5339e69a

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=2066479

https://access.redhat.com/errata/RHSA-2022:4798

插件详情

严重性: Critical

ID: 161674

文件名: redhat-RHSA-2022-4798.nasl

版本: 1.8

类型: local

代理: unix

发布时间: 2022/5/30

最近更新时间: 2024/4/28

支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

风险信息

VPR

风险因素: Medium

分数: 6.7

CVSS v2

风险因素: High

基本分数: 7.5

时间分数: 5.5

矢量: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS 分数来源: CVE-2022-29599

CVSS v3

风险因素: Critical

基本分数: 9.8

时间分数: 8.5

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

漏洞信息

CPE: cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:rhel_eus:8.2, cpe:/o:redhat:rhel_eus:8.4, p-cpe:/a:redhat:enterprise_linux:aopalliance, p-cpe:/a:redhat:enterprise_linux:apache-commons-cli, p-cpe:/a:redhat:enterprise_linux:apache-commons-codec, p-cpe:/a:redhat:enterprise_linux:apache-commons-io, p-cpe:/a:redhat:enterprise_linux:apache-commons-lang3, p-cpe:/a:redhat:enterprise_linux:apache-commons-logging, p-cpe:/a:redhat:enterprise_linux:atinject, p-cpe:/a:redhat:enterprise_linux:cdi-api, p-cpe:/a:redhat:enterprise_linux:geronimo-annotation, p-cpe:/a:redhat:enterprise_linux:glassfish-el, p-cpe:/a:redhat:enterprise_linux:glassfish-el-api, p-cpe:/a:redhat:enterprise_linux:google-guice, p-cpe:/a:redhat:enterprise_linux:guava20, p-cpe:/a:redhat:enterprise_linux:hawtjni, p-cpe:/a:redhat:enterprise_linux:hawtjni-runtime, p-cpe:/a:redhat:enterprise_linux:httpcomponents-client, p-cpe:/a:redhat:enterprise_linux:httpcomponents-core, p-cpe:/a:redhat:enterprise_linux:jansi, p-cpe:/a:redhat:enterprise_linux:jansi-native, p-cpe:/a:redhat:enterprise_linux:jboss-interceptors-1.2-api, p-cpe:/a:redhat:enterprise_linux:jcl-over-slf4j, p-cpe:/a:redhat:enterprise_linux:jsoup, p-cpe:/a:redhat:enterprise_linux:maven, p-cpe:/a:redhat:enterprise_linux:maven-lib, p-cpe:/a:redhat:enterprise_linux:maven-resolver, p-cpe:/a:redhat:enterprise_linux:maven-resolver-api, p-cpe:/a:redhat:enterprise_linux:maven-resolver-connector-basic, p-cpe:/a:redhat:enterprise_linux:maven-resolver-impl, p-cpe:/a:redhat:enterprise_linux:maven-resolver-spi, p-cpe:/a:redhat:enterprise_linux:maven-resolver-transport-wagon, p-cpe:/a:redhat:enterprise_linux:maven-resolver-util, p-cpe:/a:redhat:enterprise_linux:maven-shared-utils, p-cpe:/a:redhat:enterprise_linux:maven-wagon, p-cpe:/a:redhat:enterprise_linux:maven-wagon-file, p-cpe:/a:redhat:enterprise_linux:maven-wagon-http, p-cpe:/a:redhat:enterprise_linux:maven-wagon-http-shared, p-cpe:/a:redhat:enterprise_linux:maven-wagon-provider-api, p-cpe:/a:redhat:enterprise_linux:plexus-cipher, p-cpe:/a:redhat:enterprise_linux:plexus-classworlds, p-cpe:/a:redhat:enterprise_linux:plexus-containers, p-cpe:/a:redhat:enterprise_linux:plexus-containers-component-annotations, p-cpe:/a:redhat:enterprise_linux:plexus-interpolation, p-cpe:/a:redhat:enterprise_linux:plexus-sec-dispatcher, p-cpe:/a:redhat:enterprise_linux:plexus-utils, p-cpe:/a:redhat:enterprise_linux:sisu, p-cpe:/a:redhat:enterprise_linux:sisu-inject, p-cpe:/a:redhat:enterprise_linux:sisu-plexus, p-cpe:/a:redhat:enterprise_linux:slf4j

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

易利用性: No known exploits are available

补丁发布日期: 2022/5/30

漏洞发布日期: 2022/4/27

参考资料信息

CVE: CVE-2022-29599

CWE: 77

RHSA: 2022:4798