{"id":"CVE-2024-47197","details":"Exposure of Sensitive Information to an Unauthorized Actor, Insecure Storage of Sensitive Information vulnerability in Maven Archetype Plugin.\n\nThis issue affects Maven Archetype Plugin: from 3.2.1 before 3.3.0.\n\nUsers are recommended to upgrade to version 3.3.0, which fixes the issue.\n\nArchetype integration testing creates a file\ncalled ./target/classes/archetype-it/archetype-settings.xml\nThis file contains all the content from the users ~/.m2/settings.xml file,\nwhich often contains information they do not want to publish. We expect that on many developer machines, this also contains\ncredentials.\n\nWhen the user runs mvn verify again (without a mvn clean), this file becomes part of\nthe final artifact.\n\nIf a developer were to publish this into Maven Central or any other remote repository (whether as a release\nor a snapshot) their credentials would be published without them knowing.","aliases":["GHSA-2qq7-fch2-phqf"],"modified":"2026-04-10T05:18:18.288556Z","published":"2024-09-26T08:15:06.587Z","related":["openSUSE-SU-2024:14372-1"],"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/09/26/2"},{"type":"ARTICLE","url":"https://lists.apache.org/thread/ftg81np183wnyk0kg4ks95dvgxdrof96"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/maven-archetype","events":[{"introduced":"0"},{"last_affected":"c8e9ce1372d3a87d1166e7ad756e025627ebb6b8"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.2.1"}]}}],"versions":["maven-archetype-2.3","maven-archetype-2.4","maven-archetype-3.0.0","maven-archetype-3.0.1","maven-archetype-3.1.0","maven-archetype-3.1.1","maven-archetype-3.1.1_vote-1","maven-archetype-3.1.2","maven-archetype-3.2.0","maven-archetype-3.2.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47197.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}