Description
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
Published: 2022-10-13
Score: 9.8 Critical
EPSS: 94.3% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Upgrade to Apache Commons Text 1.10.0.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-599f-7c49-w659 Arbitrary code execution in Apache Commons Text
History

Tue, 25 Feb 2025 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Eus
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7
cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7
Vendors & Products Redhat jboss Enterprise Application Platform Eus

Wed, 20 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Apache Commons Text
Juniper Jsa1500 Jsa3500 Jsa3800 Jsa5500 Jsa5800 Jsa7500 Jsa7800 Security Threat Response Manager
Netapp Bluexp
Redhat Amq Broker Amq Streams Camel Quarkus Camel Spring Boot Jboss Enterprise Application Platform Eus Jboss Enterprise Bpms Platform Jboss Fuse Ocp Tools Openshift Quarkus Satellite
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-11-20T16:19:41.416Z

Reserved: 2022-10-12T00:00:00.000Z

Link: CVE-2022-42889

cve-icon Vulnrichment

Updated: 2024-08-03T13:19:05.212Z

cve-icon NVD

Status : Modified

Published: 2022-10-13T13:15:10.113

Modified: 2024-11-21T07:25:32.100

Link: CVE-2022-42889

cve-icon Redhat

Severity : Critical

Publid Date: 2022-10-13T00:00:00Z

Links: CVE-2022-42889 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses