plexus-xml is vulnerable to Regular Expression Denial of Service (ReDoS)
28
Low Risk
Affected versions of this package use a polynomial-time regular expression in the XML encoding detection logic (ENCODING_PATTERN) that is susceptible to catastrophic backtracking on crafted XML input, leading to excessive CPU usage (a regular expression denial of service). The patched version changes the pattern to use non-greedy matching.
You are affected if you are using a version that falls within the vulnerable range.
plexus-xml is vulnerable to Regular Expression Denial of Service (ReDoS) in versions 3.0.0 - 4.1.0.
Upgrade the org.codehaus.plexus:plexus-xml library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant