CVE-2023-34112

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-34112
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-34112.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-34112
Aliases
  • GHSA-36rx-hq22-jm5x
Published
2023-06-08T23:05:36.423Z
Modified
2025-11-15T06:40:10.638493Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
JavaCPP project actions vulnerable to code injection
Details

JavaCPP Presets is a project providing Java distributions of native C++ libraries. All the actions in the bytedeco/javacpp-presets use the github.event.head_commit.message​ parameter in an insecure way. For example, the commit message is used in a run statement - resulting in a command injection vulnerability due to string interpolation. No exploitation has been reported. This issue has been addressed in version 1.5.9. Users of JavaCPP Presets are advised to upgrade as a precaution.

Database specific
{
    "cwe_ids": [
        "CWE-94"
    ]
}
References

Affected packages

Git / github.com/bytedeco/javacpp-presets

Affected ranges

Type
GIT
Repo
https://github.com/bytedeco/javacpp-presets
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.10
0.11
0.6
0.7
0.8
0.9

1.*

1.0
1.1
1.2
1.3
1.4
1.4.1
1.4.2
1.4.4
1.5
1.5.1
1.5.2
1.5.3
1.5.4
1.5.5
1.5.6
1.5.7
1.5.8