First published: Thu Oct 13 2022(Updated: )
A flaw was found in Apache Commons Text packages 1.5 through 1.9. The affected versions allow an attacker to benefit from a variable interpolation process contained in Apache Commons Text, which can cause properties to be dynamically defined. Server applications are vulnerable to remote code execution (RCE) and unintentional contact with untrusted remote servers.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:4.11.1683009941-1.el8 | 2-plugins-0:4.11.1683009941-1.el8 |
redhat/jenkins | <2-plugins-0:4.12.1683009955-1.el8 | 2-plugins-0:4.12.1683009955-1.el8 |
redhat/jenkins | <2-plugins-0:4.13.1684911916-1.el8 | 2-plugins-0:4.13.1684911916-1.el8 |
redhat/jenkins | <2-plugins-0:4.10.1680703106-1.el8 | 2-plugins-0:4.10.1680703106-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1680069756-1.el8 | 2-plugins-0:4.9.1680069756-1.el8 |
redhat/candlepin | <0:4.1.18-1.el8 | 0:4.1.18-1.el8 |
redhat/candlepin | <0:4.2.13-1.el8 | 0:4.2.13-1.el8 |
Apache Commons Text | >=1.5<1.10.0 | |
Netapp Bluexp | ||
Juniper Security Threat Response Manager | <7.5.0 | |
Juniper Security Threat Response Manager | =7.5.0 | |
Juniper Security Threat Response Manager | =7.5.0-up1 | |
Juniper Security Threat Response Manager | =7.5.0-up2 | |
Juniper Security Threat Response Manager | =7.5.0-up3 | |
Juniper Jsa1500 | ||
IBM Security Guardium | ||
IBM Security Guardium | ||
IBM Security Guardium | ||
IBM Security Guardium | ||
IBM Security Guardium | ||
IBM Security Guardium | ||
IBM Security Guardium | <=11.3 | |
IBM Security Guardium | <=11.4 | |
IBM Security Guardium | <=11.5 | |
redhat/commons-text | <1.10.0 | 1.10.0 |
All of | ||
Any of | ||
Juniper Security Threat Response Manager | <7.5.0 | |
Juniper Security Threat Response Manager | =7.5.0 | |
Juniper Security Threat Response Manager | =7.5.0-up1 | |
Juniper Security Threat Response Manager | =7.5.0-up2 | |
Juniper Security Threat Response Manager | =7.5.0-up3 | |
Any of | ||
Juniper Jsa1500 | ||
IBM Security Guardium | ||
IBM Security Guardium | ||
IBM Security Guardium | ||
IBM Security Guardium | ||
IBM Security Guardium | ||
IBM Security Guardium | ||
maven/com.guicedee.services:commons-text | <=1.2.2.1-jre17 | |
maven/org.apache.commons:commons-text | >=1.5<1.10.0 | 1.10.0 |
>=1.5<1.10.0 | ||
All of | ||
Any of | ||
<7.5.0 | ||
=7.5.0 | ||
=7.5.0-up1 | ||
=7.5.0-up2 | ||
=7.5.0-up3 | ||
Any of | ||
This flaw may be avoided by ensuring that any external inputs used with the Commons-Text lookup methods are sanitized properly. Untrusted input should always be thoroughly sanitized before using in any potentially risky situations.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-42889 is a vulnerability in Apache Commons Text that could allow a remote attacker to execute arbitrary code on the system.
CVE-2022-42889 has a severity keyword of 'critical' and a severity value of 9.8.
CVE-2022-42889 affects Apache Commons Text by allowing properties to be dynamically evaluated and expanded, which can be exploited by an attacker to execute arbitrary code on the system.
To fix CVE-2022-42889 in Apache Commons Text, update to version 1.10.0 or later.
You can find more information about CVE-2022-42889 on the GitHub page and the Red Hat security advisories linked in the references.