|
|||
Rule General Information |
---|
Release Date: | 2022-10-14 | |
Rule Name: | Apache Commons Text Remote Code Exection Vulnerability (CVE-2022-42889)-1 | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | A remote code execution vulnerability exists in Apache Commons Text prior to 1.10.0 due to improper validation of interpolation defaults. The "prefix" in the Apache Commons Text interpolation format "${prefix:name}" is used to locate the instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation, if the Lookup instance contains untrusted configuration values , the attacker can execute malicious code by constructing malicious text. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://github.com/apache/commons-text/commit/b9b40b903e2d1f9935039803c9852439576780ea |
|
Solutions |
---|
The vendor has released upgrade patches to fix vulnerabilities. Upgrade org.apache.commons:commons-text to 1.10.0 or later. Please visit: https://seclists.org/oss-sec/2022/q4/22 |