CWE
94 1188
Advisory Published
Advisory Published
Updated

CVE-2022-42889: Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults

First published: Thu Oct 13 2022(Updated: )

A flaw was found in Apache Commons Text packages 1.5 through 1.9. The affected versions allow an attacker to benefit from a variable interpolation process contained in Apache Commons Text, which can cause properties to be dynamically defined. Server applications are vulnerable to remote code execution (RCE) and unintentional contact with untrusted remote servers.

Credit: security@apache.org security@apache.org

Affected SoftwareAffected VersionHow to fix
redhat/jenkins<2-plugins-0:4.11.1683009941-1.el8
2-plugins-0:4.11.1683009941-1.el8
redhat/jenkins<2-plugins-0:4.12.1683009955-1.el8
2-plugins-0:4.12.1683009955-1.el8
redhat/jenkins<2-plugins-0:4.13.1684911916-1.el8
2-plugins-0:4.13.1684911916-1.el8
redhat/jenkins<2-plugins-0:4.10.1680703106-1.el8
2-plugins-0:4.10.1680703106-1.el8
redhat/jenkins<2-plugins-0:4.9.1680069756-1.el8
2-plugins-0:4.9.1680069756-1.el8
redhat/candlepin<0:4.1.18-1.el8
0:4.1.18-1.el8
redhat/candlepin<0:4.2.13-1.el8
0:4.2.13-1.el8
Apache Commons Text>=1.5<1.10.0
Netapp Bluexp
Juniper Security Threat Response Manager<7.5.0
Juniper Security Threat Response Manager=7.5.0
Juniper Security Threat Response Manager=7.5.0-up1
Juniper Security Threat Response Manager=7.5.0-up2
Juniper Security Threat Response Manager=7.5.0-up3
Juniper Jsa1500
IBM Security Guardium
IBM Security Guardium
IBM Security Guardium
IBM Security Guardium
IBM Security Guardium
IBM Security Guardium
IBM Security Guardium<=11.3
IBM Security Guardium<=11.4
IBM Security Guardium<=11.5
redhat/commons-text<1.10.0
1.10.0
All of
Any of
Juniper Security Threat Response Manager<7.5.0
Juniper Security Threat Response Manager=7.5.0
Juniper Security Threat Response Manager=7.5.0-up1
Juniper Security Threat Response Manager=7.5.0-up2
Juniper Security Threat Response Manager=7.5.0-up3
Any of
Juniper Jsa1500
IBM Security Guardium
IBM Security Guardium
IBM Security Guardium
IBM Security Guardium
IBM Security Guardium
IBM Security Guardium
maven/com.guicedee.services:commons-text<=1.2.2.1-jre17
maven/org.apache.commons:commons-text>=1.5<1.10.0
1.10.0
>=1.5<1.10.0
All of
Any of
<7.5.0
=7.5.0
=7.5.0-up1
=7.5.0-up2
=7.5.0-up3
Any of

Remedy

This flaw may be avoided by ensuring that any external inputs used with the Commons-Text lookup methods are sanitized properly. Untrusted input should always be thoroughly sanitized before using in any potentially risky situations.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is CVE-2022-42889?

    CVE-2022-42889 is a vulnerability in Apache Commons Text that could allow a remote attacker to execute arbitrary code on the system.

  • What is the severity of CVE-2022-42889?

    CVE-2022-42889 has a severity keyword of 'critical' and a severity value of 9.8.

  • How does CVE-2022-42889 affect Apache Commons Text?

    CVE-2022-42889 affects Apache Commons Text by allowing properties to be dynamically evaluated and expanded, which can be exploited by an attacker to execute arbitrary code on the system.

  • How can I fix CVE-2022-42889 in Apache Commons Text?

    To fix CVE-2022-42889 in Apache Commons Text, update to version 1.10.0 or later.

  • Where can I find more information about CVE-2022-42889?

    You can find more information about CVE-2022-42889 on the GitHub page and the Red Hat security advisories linked in the references.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203