Description
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
No analysis available yet.
Remediation
Vendor Workaround
Upgrade to Apache Commons Text 1.10.0.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-599f-7c49-w659 | Arbitrary code execution in Apache Commons Text |
References
History
Tue, 25 Feb 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat jboss Enterprise Application Platform Eus
|
|
| CPEs | cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7 cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7 |
|
| Vendors & Products |
Redhat jboss Enterprise Application Platform Eus
|
Wed, 20 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Apache
Subscribe
Commons Text
Subscribe
Juniper
Subscribe
Jsa1500
Subscribe
Jsa3500
Subscribe
Jsa3800
Subscribe
Jsa5500
Subscribe
Jsa5800
Subscribe
Jsa7500
Subscribe
Jsa7800
Subscribe
Security Threat Response Manager
Subscribe
Netapp
Subscribe
Bluexp
Subscribe
Redhat
Subscribe
Amq Broker
Subscribe
Amq Streams
Subscribe
Camel Quarkus
Subscribe
Camel Spring Boot
Subscribe
Jboss Enterprise Application Platform Eus
Subscribe
Jboss Enterprise Bpms Platform
Subscribe
Jboss Fuse
Subscribe
Ocp Tools
Subscribe
Openshift
Subscribe
Quarkus
Subscribe
Satellite
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-11-20T16:19:41.416Z
Reserved: 2022-10-12T00:00:00.000Z
Link: CVE-2022-42889
Updated: 2024-08-03T13:19:05.212Z
Status : Modified
Published: 2022-10-13T13:15:10.113
Modified: 2024-11-21T07:25:32.100
Link: CVE-2022-42889
OpenCVE Enrichment
No data.
Github GHSA