First published: Wed Jul 06 2022(Updated: )
A flaw was found in Apache Commons Configuration's variable interpolation, which by default included several lookup actions that could permit script invocation on remote servers. This issue could allow an attacker to use one of these actions to send a request to execute arbitrary code on the server.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/commons-configuration | <2.8.0 | 2.8.0 |
redhat/candlepin | <0:4.2.13-1.el8 | 0:4.2.13-1.el8 |
debian/commons-configuration2 | 2.2-1+deb10u1 2.8.0-1~deb11u1 2.8.0-2 | |
Apache Commons Configuration | >=2.4<2.8 | |
Netapp Snapcenter | ||
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2022-33980.
The severity of CVE-2022-33980 is critical with a severity score of 9.8.
Apache Commons Configuration 2.8.0, Candlepin 0:4.2.13-1.el8, and certain versions of Debian Commons Configuration 2 are affected by CVE-2022-33980.
Apply the latest security patches provided by the respective vendors to upgrade Apache Commons Configuration, Candlepin, or Debian Commons Configuration to the fixed versions.
You can find more information about CVE-2022-33980 in the references provided: [Apache mailing list](https://lists.apache.org/thread/tdf5n7j80lfxdhs2764vn0xmpfodm87s), [Red Hat Security Advisory RHSA-2022:6916](https://access.redhat.com/errata/RHSA-2022:6916), [Red Hat Security Advisory RHSA-2022:8652](https://access.redhat.com/errata/RHSA-2022:8652).