9.8

CVE-2022-42889

Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ApacheCommons Text Version >= 1.5 < 1.10.0
NetappBluexp Version-
JuniperSecurity Threat Response Manager Version < 7.5.0
   JuniperJsa1500 Version-
   JuniperJsa3500 Version-
   JuniperJsa3800 Version-
   JuniperJsa5500 Version-
   JuniperJsa5800 Version-
   JuniperJsa7500 Version-
   JuniperJsa7800 Version-
JuniperSecurity Threat Response Manager Version7.5.0 Update-
   JuniperJsa1500 Version-
   JuniperJsa3500 Version-
   JuniperJsa3800 Version-
   JuniperJsa5500 Version-
   JuniperJsa5800 Version-
   JuniperJsa7500 Version-
   JuniperJsa7800 Version-
JuniperSecurity Threat Response Manager Version7.5.0 Updateup1
   JuniperJsa1500 Version-
   JuniperJsa3500 Version-
   JuniperJsa3800 Version-
   JuniperJsa5500 Version-
   JuniperJsa5800 Version-
   JuniperJsa7500 Version-
   JuniperJsa7800 Version-
JuniperSecurity Threat Response Manager Version7.5.0 Updateup2
   JuniperJsa1500 Version-
   JuniperJsa3500 Version-
   JuniperJsa3800 Version-
   JuniperJsa5500 Version-
   JuniperJsa5800 Version-
   JuniperJsa7500 Version-
   JuniperJsa7800 Version-
JuniperSecurity Threat Response Manager Version7.5.0 Updateup3
   JuniperJsa1500 Version-
   JuniperJsa3500 Version-
   JuniperJsa3800 Version-
   JuniperJsa5500 Version-
   JuniperJsa5800 Version-
   JuniperJsa7500 Version-
   JuniperJsa7800 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.16% 0.999
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.