gsd-2022-42889
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2022-42889",
    "description": "Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is \"${prefix:name}\", where \"prefix\" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - \"script\" - execute expressions using the JVM script execution engine (javax.script) - \"dns\" - resolve dns records - \"url\" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.",
    "id": "GSD-2022-42889",
    "references": [
      "https://access.redhat.com/errata/RHSA-2022:8652",
      "https://access.redhat.com/errata/RHSA-2022:8876",
      "https://access.redhat.com/errata/RHSA-2022:8902",
      "https://access.redhat.com/errata/RHSA-2022:9023",
      "https://www.suse.com/security/cve/CVE-2022-42889.html",
      "https://access.redhat.com/errata/RHSA-2023:0261",
      "https://access.redhat.com/errata/RHSA-2023:0469",
      "https://access.redhat.com/errata/RHSA-2023:1006"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2022-42889"
      ],
      "details": "Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is \"${prefix:name}\", where \"prefix\" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - \"script\" - execute expressions using the JVM script execution engine (javax.script) - \"dns\" - resolve dns records - \"url\" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.",
      "id": "GSD-2022-42889",
      "modified": "2023-12-13T01:19:10.913162Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "security@apache.org",
        "ID": "CVE-2022-42889",
        "STATE": "PUBLIC",
        "TITLE": "Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Apache Commons Text",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "\u003e=",
                          "version_name": "Apache Commons Text",
                          "version_value": "1.5"
                        },
                        {
                          "version_affected": "\u003c=",
                          "version_value": "1.9"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Apache Software Foundation"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is \"${prefix:name}\", where \"prefix\" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - \"script\" - execute expressions using the JVM script execution engine (javax.script) - \"dns\" - resolve dns records - \"url\" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default."
          }
        ]
      },
      "generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "impact": [
        {
          "other": "important"
        }
      ],
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "Unexpected variable interpolation"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om",
            "refsource": "MISC",
            "url": "https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om"
          },
          {
            "name": "[oss-security] 20221013 CVE-2022-42889: Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults",
            "refsource": "MLIST",
            "url": "http://www.openwall.com/lists/oss-security/2022/10/13/4"
          },
          {
            "name": "[oss-security] 20221017 Re: CVE-2022-42889: Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults",
            "refsource": "MLIST",
            "url": "http://www.openwall.com/lists/oss-security/2022/10/18/1"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20221020-0004/",
            "refsource": "CONFIRM",
            "url": "https://security.netapp.com/advisory/ntap-20221020-0004/"
          },
          {
            "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022",
            "refsource": "CONFIRM",
            "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022"
          },
          {
            "name": "GLSA-202301-05",
            "refsource": "GENTOO",
            "url": "https://security.gentoo.org/glsa/202301-05"
          },
          {
            "name": "20230214 OXAS-ADV-2022-0002: OX App Suite Security Advisory",
            "refsource": "FULLDISC",
            "url": "http://seclists.org/fulldisclosure/2023/Feb/3"
          },
          {
            "name": "http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html",
            "refsource": "MISC",
            "url": "http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html"
          },
          {
            "name": "http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html",
            "refsource": "MISC",
            "url": "http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html"
          }
        ]
      },
      "source": {
        "discovery": "UNKNOWN"
      },
      "work_around": [
        {
          "lang": "eng",
          "value": "Upgrade to Apache Commons Text 1.10.0."
        }
      ]
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "(,1.2.2.1-jre17]",
          "affected_versions": "All versions up to 1.2.2.1-jre17",
          "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "cwe_ids": [
            "CWE-1035",
            "CWE-78",
            "CWE-937",
            "CWE-94"
          ],
          "date": "2023-06-12",
          "description": "Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is \"${prefix:name}\", where \"prefix\" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - \"script\" - execute expressions using the JVM script execution engine (javax.script) - \"dns\" - resolve dns records - \"url\" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.",
          "fixed_versions": [],
          "identifier": "CVE-2022-42889",
          "identifiers": [
            "GHSA-599f-7c49-w659",
            "CVE-2022-42889"
          ],
          "not_impacted": "",
          "package_slug": "maven/com.guicedee.services/commons-text",
          "pubdate": "2022-10-13",
          "solution": "Unfortunately, there is no solution available yet.",
          "title": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "urls": [
            "https://nvd.nist.gov/vuln/detail/CVE-2022-42889",
            "https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om",
            "http://www.openwall.com/lists/oss-security/2022/10/13/4",
            "https://securitylab.github.com/advisories/GHSL-2022-018_Apache_Commons_Text",
            "http://www.openwall.com/lists/oss-security/2022/10/18/1",
            "https://security.netapp.com/advisory/ntap-20221020-0004/",
            "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022",
            "https://security.gentoo.org/glsa/202301-05",
            "http://seclists.org/fulldisclosure/2023/Feb/3",
            "http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html",
            "https://arxiv.org/pdf/2306.05534",
            "https://github.com/advisories/GHSA-599f-7c49-w659"
          ],
          "uuid": "7168e25d-954e-4aad-9a09-829253f2c3df"
        },
        {
          "affected_range": "[1.5,1.10.0)",
          "affected_versions": "All versions starting from 1.5 before 1.10.0",
          "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "cwe_ids": [
            "CWE-1035",
            "CWE-937",
            "CWE-94"
          ],
          "date": "2022-11-29",
          "description": "Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is \"${prefix:name}\", where \"prefix\" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - \"script\" - execute expressions using the JVM script execution engine (javax.script) - \"dns\" - resolve dns records - \"url\" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.",
          "fixed_versions": [
            "1.10.0"
          ],
          "identifier": "CVE-2022-42889",
          "identifiers": [
            "CVE-2022-42889",
            "GHSA-599f-7c49-w659"
          ],
          "not_impacted": "",
          "package_slug": "maven/org.apache.commons/commons-text",
          "pubdate": "2022-10-13",
          "solution": "Upgrade to version 1.10.0 or above.",
          "title": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "urls": [
            "https://nvd.nist.gov/vuln/detail/CVE-2022-42889",
            "https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om",
            "http://www.openwall.com/lists/oss-security/2022/10/13/4",
            "https://github.com/advisories/GHSA-599f-7c49-w659"
          ],
          "uuid": "d9bd344f-2ac1-4d98-883d-9b9a4df54c4b"
        }
      ]
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:apache:commons_text:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F52B385F-442F-4587-B680-DD74CC525D27",
                    "versionEndExcluding": "1.10.0",
                    "versionStartIncluding": "1.5",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:netapp:bluexp:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FC1AE8BD-EE3F-494C-9F03-D4B2B7233106",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:juniper:security_threat_response_manager:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "334BA50E-637D-42E7-AD73-BC13498D79D0",
                    "versionEndExcluding": "7.5.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:juniper:security_threat_response_manager:7.5.0:-:*:*:*:*:*:*",
                    "matchCriteriaId": "F5745211-E47A-481B-928F-B56013DAC19C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:juniper:security_threat_response_manager:7.5.0:up1:*:*:*:*:*:*",
                    "matchCriteriaId": "1B716977-E015-4628-854B-5828FC3DC150",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:juniper:security_threat_response_manager:7.5.0:up2:*:*:*:*:*:*",
                    "matchCriteriaId": "22F53DC6-084C-4C06-9A5C-550511E5CC58",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:juniper:security_threat_response_manager:7.5.0:up3:*:*:*:*:*:*",
                    "matchCriteriaId": "41FFF517-DCAC-4CF1-A6D7-29828B037245",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:juniper:jsa1500:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D6F62545-4393-4FD6-9EF4-3516E8835F58",
                    "vulnerable": false
                  },
                  {
                    "criteria": "cpe:2.3:h:juniper:jsa3500:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BBF05B6A-B4F6-4F7A-927E-106A8C1E8ED7",
                    "vulnerable": false
                  },
                  {
                    "criteria": "cpe:2.3:h:juniper:jsa3800:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "421FD233-CA15-4207-8690-6A1C4C23BDB8",
                    "vulnerable": false
                  },
                  {
                    "criteria": "cpe:2.3:h:juniper:jsa5500:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "08C686CC-C971-4891-B8F9-9BE4C09B1160",
                    "vulnerable": false
                  },
                  {
                    "criteria": "cpe:2.3:h:juniper:jsa5800:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9075ED11-DD7E-49E2-90F5-50ACFCD2F4A4",
                    "vulnerable": false
                  },
                  {
                    "criteria": "cpe:2.3:h:juniper:jsa7500:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "57A506DE-88CE-45C9-A41A-9B5B4E62F36C",
                    "vulnerable": false
                  },
                  {
                    "criteria": "cpe:2.3:h:juniper:jsa7800:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7AFBD1EF-96B1-475E-896A-4000463FEA0A",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is \"${prefix:name}\", where \"prefix\" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - \"script\" - execute expressions using the JVM script execution engine (javax.script) - \"dns\" - resolve dns records - \"url\" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default."
          },
          {
            "lang": "es",
            "value": "Apache Commons Text lleva a cabo una interpolaci\u00f3n de variables, permitiendo que las propiedades sean evaluadas y expandidas din\u00e1micamente. El formato est\u00e1ndar para la interpolaci\u00f3n es \"${prefix:name}\", donde \"prefix\" es usado para localizar una instancia de org.apache.commons.text.lookup.StringLookup que lleva a cabo la interpolaci\u00f3n. A partir de la versi\u00f3n 1.5 y hasta 1.9, el conjunto de instancias de Lookup por defecto inclu\u00eda interpoladores que pod\u00edan dar lugar a una ejecuci\u00f3n de c\u00f3digo arbitrario o al contacto con servidores remotos. Estos lookups son: - \"script\" - ejecuta expresiones usando el motor de ejecuci\u00f3n de scripts de la JVM (javax.script) - \"dns\" - resuelve registros dns - \"url\" - carga valores de urls, incluso de servidores remotos Las aplicaciones usando los interpoladores por defecto en las versiones afectadas pueden ser vulnerables a una ejecuci\u00f3n de c\u00f3digo remota o al contacto involuntario con servidores remotos si son usados valores de configuraci\u00f3n que no son confiables. Es recomendado a usuarios actualizar a Apache Commons Text versi\u00f3n 1.10.0, que deshabilita los interpoladores problem\u00e1ticos por defecto"
          }
        ],
        "id": "CVE-2022-42889",
        "lastModified": "2024-01-19T16:15:08.583",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "HIGH",
                "baseScore": 9.8,
                "baseSeverity": "CRITICAL",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "HIGH",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 5.9,
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        },
        "published": "2022-10-13T13:15:10.113",
        "references": [
          {
            "source": "security@apache.org",
            "tags": [
              "Third Party Advisory",
              "VDB Entry"
            ],
            "url": "http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html"
          },
          {
            "source": "security@apache.org",
            "url": "http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html"
          },
          {
            "source": "security@apache.org",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://seclists.org/fulldisclosure/2023/Feb/3"
          },
          {
            "source": "security@apache.org",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2022/10/13/4"
          },
          {
            "source": "security@apache.org",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2022/10/18/1"
          },
          {
            "source": "security@apache.org",
            "tags": [
              "Mailing List",
              "Vendor Advisory"
            ],
            "url": "https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om"
          },
          {
            "source": "security@apache.org",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022"
          },
          {
            "source": "security@apache.org",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://security.gentoo.org/glsa/202301-05"
          },
          {
            "source": "security@apache.org",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20221020-0004/"
          }
        ],
        "sourceIdentifier": "security@apache.org",
        "vulnStatus": "Modified",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-94"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.