Lucene search

K
nvd[email protected]NVD:CVE-2022-42889
HistoryOct 13, 2022 - 1:15 p.m.

CVE-2022-42889

2022-10-1313:15:10
CWE-94
web.nvd.nist.gov
10
cve-2022-42889
apache commons text
variable interpolation
dynamic evaluation
remote code execution
remote servers
upgrade

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.971

Percentile

99.8%

Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is “${prefix:name}”, where “prefix” is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - “script” - execute expressions using the JVM script execution engine (javax.script) - “dns” - resolve dns records - “url” - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.

Affected configurations

Nvd
Node
apachecommons_textRange1.51.10.0
Node
netappbluexpMatch-
Node
juniperjsa1500Match-
OR
juniperjsa3500Match-
OR
juniperjsa3800Match-
OR
juniperjsa5500Match-
OR
juniperjsa5800Match-
OR
juniperjsa7500Match-
OR
juniperjsa7800Match-
AND
junipersecurity_threat_response_managerRange<7.5.0
OR
junipersecurity_threat_response_managerMatch7.5.0-
OR
junipersecurity_threat_response_managerMatch7.5.0up1
OR
junipersecurity_threat_response_managerMatch7.5.0up2
OR
junipersecurity_threat_response_managerMatch7.5.0up3
VendorProductVersionCPE
apachecommons_text*cpe:2.3:a:apache:commons_text:*:*:*:*:*:*:*:*
netappbluexp-cpe:2.3:a:netapp:bluexp:-:*:*:*:*:*:*:*
juniperjsa1500-cpe:2.3:h:juniper:jsa1500:-:*:*:*:*:*:*:*
juniperjsa3500-cpe:2.3:h:juniper:jsa3500:-:*:*:*:*:*:*:*
juniperjsa3800-cpe:2.3:h:juniper:jsa3800:-:*:*:*:*:*:*:*
juniperjsa5500-cpe:2.3:h:juniper:jsa5500:-:*:*:*:*:*:*:*
juniperjsa5800-cpe:2.3:h:juniper:jsa5800:-:*:*:*:*:*:*:*
juniperjsa7500-cpe:2.3:h:juniper:jsa7500:-:*:*:*:*:*:*:*
juniperjsa7800-cpe:2.3:h:juniper:jsa7800:-:*:*:*:*:*:*:*
junipersecurity_threat_response_manager*cpe:2.3:a:juniper:security_threat_response_manager:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 141

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.971

Percentile

99.8%